Book by Linda Herrera on the “Egyptian Popular Insurrection and the Internet”: “Egypt’s January 25 revolution was triggered by a Facebook page and played out both in virtual spaces and the streets. Social media serves as a space of liberation, but it also functions as an arena where competing forces vie over the minds of the young as they battle over ideas as important as the nature of freedom and the place of the rising generation in the political order. This book provides piercing insights into the ongoing struggles between people and power in the digital age.”
The Golden Record 2.0 Will Crowdsource A Selfie of Human Culture
Helen Thompson in the Smithsonian: “In 1977, the Voyager 1 and 2 spacecraft left our solar system, carrying a “Golden Record”—a gold-plated phonograph record containing analogue images, greetings, and music from Earth. It was meant to be a snapshot of humanity. On the small chance that an alien lifeform encountered Voyager, they could get a sense of who made it.
“This record represents our hope and our determination and our goodwill in a vast and awesome universe,” said Carl Sagan who led the six-member team that created the Golden Record.
No spacecraft has left our solar system since Voyager, but in the next few years, NASA’s New Horizons probe, launched in 2006, will reach Pluto and then pass into the far edges of the solar system and beyond. A new project aims to create a “Golden Record 2.0”. Just like the original record, this new version will represent a sampling of human culture for NASA to transmit to New Horizons just before it soars off into the rest of the universe.
The genesis of the project came from Jon Lomberg, a scientific artist and the designer of the original Golden Record. Over the last year he’s recruited experts in a variety of fields to back the project. To convince NASA of public support, he launched a website and put together a petition, signed by over 10,000 people in 140 countries. When Lomberg presented the idea to NASA earlier this year, the agency was receptive and will be releasing a statement with further details on the project on August 25. In the meantime, he and his colleague Albert Yu-Min Lin, a research scientist at the University of California in San Diego, gave a preview of their plan at Smithsonian’s Future Is Here event in Washington, DC, today.
New Horizons will likely only have a small amount of memory space available for the content, so what should make the cut? Photos of landscapes and animals (including humans), sound bites of great speakers, popular music, or even videos could end up on the digital record. Lin is developing a platform where people will be able to explore and critique the submissions on the site. “We wanted to make this a democratic discussion,” says Lin. “How do we make this not a conversation about cute cats and Justin Beiber?” One can only guess what aliens might make of the Earth’s YouTube video fodder.
What sets this new effort apart from the original is that the content will be crowdsourced. “We thought this time why not let the people of earth speak for themselves,” says Lomberg. “Why not figure out a way to crowd source this message so that people would be able to decide what they wanted to say?” Lomberg has teamed up with Lin, who specializes in crowdsourcing technology, to create a platform where people from all over the world can submit content to be included on the record…”
Open Data at Core of New Governance Paradigm
GovExec: “Rarely are federal agencies compared favorably with Facebook, Instagram, or other modern models of innovation, but there is every reason to believe they can harness innovation to improve mission effectiveness. After all, Aneesh Chopra, former U.S. Chief Technology Officer, reminded the Excellence in Government 2014 audience that government has a long history of innovation. From nuclear fusion to the Internet, the federal government has been at the forefront of technological development.
According to Chopra, the key to fueling innovation and economic prosperity today is open data. But to make the most of open data, government needs to adapt its culture. Chopra outlined three essential elements of doing so:
- Involve external experts – integrating outside ideas is second to none as a source of innovation.
- Leverage the experience of those on the front lines – federal employees who directly execute their agency’s mission often have the best sense of what does and does not work, and what can be done to improve effectiveness.
- Look to the public as a value multiplier – just as Facebook provides a platform for tens of thousands of developers to provide greater value, federal agencies can provide the raw material for many more to generate better citizen services.
In addition to these three broad elements, Chopra offered four specific levers government can use to help enact this paradigm shift:
- Democratize government data – opening government data to the public facilitates innovation. For example, data provided by the National Oceanic and Atmospheric Administration helps generate a 5 billion dollar industry by maintaining almost no intellectual property constraints on its weather data.
- Collaborate on technical standards – government can act as a convener of industry members to standardize technological development, and thereby increase the value of data shared.
- Issue challenges and prizes – incentivizing the public to get involved and participate in efforts to create value from government data enhances the government’s ability to serve the public.
- Launch government startups – programs like the Presidential Innovation Fellows initiative helps challenge rigid bureaucratic structures and permeate a culture of innovation.
Federal leaders will need a strong political platform to sustain this shift. Fortunately, this blueprint is also bipartisan, says Chopra. Political leaders on both sides of the aisle are already getting behind the movement to bring innovation to the core of government..
The Secret Science of Retweets
How come? What makes somebody retweet information from a stranger? That’s the question addressed today by Kyumin Lee from Utah State University in Logan and a few pals from IBM’s Almaden research center in San Jose….by studying the characteristics of Twitter users, it is possible to identify strangers who are more likely to pass on your message than others. And in doing this, the researchers say they’ve been able to improve the retweet rate of messages sent strangers by up to 680 percent.
So how did they do it? The new technique is based on the idea that some people are more likely to tweet than others, particularly on certain topics and at certain times of the day. So the trick is to find these individuals and target them when they are likely to be most effective.
So the approach was straightforward. The idea is to study the individuals on Twitter, looking at their profiles and their past tweeting behavior, looking for clues that they might be more likely to retweet certain types of information. Having found these individuals, send your tweets to them.
That’s the theory. In practice, it’s a little more involved. Lee and co wanted to test people’s response to two types of information: local news (in San Francisco) and tweets about bird flu, a significant issue at the time of their research. They then created several Twitter accounts with a few followers, specifically to broadcast information of this kind.
Next, they selected people to receive their tweets. For the local news broadcasts, they searched for Twitter users geolocated in the Bay area, finding over 34,000 of them and choosing 1,900 at random.
They then a sent a single message to each user of the format:
“@ SFtargetuser “A man was killed and three others were wounded in a shooting … http://bit.ly/KOl2sC” Plz RT this safety news”
So the tweet included the user’s name, a short headline, a link to the story and a request to retweet.
Of these 1,900 people, 52 retweeted the message they received. That’s 2.8 percent.
For the bird flu information, Lee and co hunted for people who had already tweeted about bird flu, finding 13,000 of them and choosing 1,900 at random. Of these, 155 retweeted the message they received, a retweet rate of 8.4 percent.
But Lee and co found a way to significantly improve these retweet rates. They went back to the original lists of Twitter users and collected publicly available information about each of them, such as their personal profile, the number of followers, the people they followed, their 200 most recent tweets and whether they retweeted the message they had received
Next, the team used a machine learning algorithm to search for correlations in this data that might predict whether somebody was more likely to retweet. For example, they looked at whether people with older accounts were more likely to retweet or how the ratio of friends to followers influenced the retweet likelihood, or even how the types of negative or positive words they used in previous tweets showed any link. They also looked at the time of day that people were most active in tweeting.
The result was a machine learning algorithm capable of picking users who were most likely to retweet on a particular topic.
And the results show that it is surprisingly effective. When the team sent local information tweets to individuals identified by the algorithm, 13.3 percent retweeted it, compared to just 2.6 percent of people chosen at random.
And they got even better results when they timed the request to match the periods when people had been most active in the past. In that case, the retweet rate rose to 19.3 percent. That’s an improvement of over 600 percent.
Similarly, the rate for bird flu information rose from 8.3 percent for users chosen at random to 19.7 percent for users chosen by the algorithm.
That’s a significant result that marketers, politicians, news organizations will be eyeing with envy.
An interesting question is how they can make this technique more generally applicable. It raises the prospect of an app that allows anybody to enter a topic of interest and which then creates a list of people most likely to retweet on that topic in the next few hours.
Lee and co do not mention any plans of this kind. But if they don’t exploit it, then there will surely be others who will.
Ref: arxiv.org/abs/1405.3750 : Who Will Retweet This? Automatically Identifying and Engaging Strangers on Twitter to Spread Information”
The Social Machine
New book by Judith Donath: “Computers were first conceived as “thinking machines,” but in the twenty-first century they have become social machines, online places where people meet friends, play games, and collaborate on projects. In this book, Judith Donath argues persuasively that for social media to become truly sociable media, we must design interfaces that reflect how we understand and respond to the social world. People and their actions are still harder to perceive online than face to face: interfaces are clunky, and we have less sense of other people’s character and intentions, where they congregate, and what they do.
Donath presents new approaches to creating interfaces for social interaction. She addresses such topics as visualizing social landscapes, conversations, and networks; depicting identity with knowledge markers and interaction history; delineating public and private space; and bringing the online world’s open sociability into the physical world. Donath asks fundamental questions about how we want to live online and offers thought-provoking designs that explore radically new ways of interacting and communicating.”
Public service workers will have to become Jacks and Jills of all trades
Catherine Needham in the Guardian: “When Kent county council was looking to save money a couple of years ago, it hit upon the idea of merging the roles of library manager and registrar. Library managers were expected to register births and deaths on top of their existing duties, and registrars took on roles in libraries. One former library manager chose to leave the service as a result. It wasn’t, he said, what he signed up for: “I don’t associate the skills in running a library with those of a registrar. I don’t have the emotional skill to do it.”
Since the council was looking to cut staff numbers, it was probably not too troubled by his departure. But this does raise questions about how to support staff who are being asked to work well beyond their professional boundaries.
In our 21st Century Public Servant project at the University of Birmingham, we have found that this trend is evident across public services. We interviewed local government managers who said staff needed to think differently about their skills. As one put it: “We need to use people’s latent talent – if you are a librarian, for example, a key skill will be working with people from the local community. It’s about a different background mindset: ‘I am not just here to do a specific job, but to help the people of this town.'”
The skills of this generic public service worker include interpersonal skills (facilitation, empathy, political skills), analysing skills (sorting evidence, making judgements, offering critique and being creative), organisation (particularly for group work and collaboration) and communication skills (such as using social media and multimedia resources).
The growing interest in genericism seems to have two main drivers. The first, of course, is austerity. Cost cutting on an unprecedented scale in local authorities requires those staff that survive the waves of redundancies to be willing to take on new roles and work in multi-purpose settings. The second is the drive for whole-person approaches in which proper engagement with the public might require staff to cross traditional sector boundaries.
It is good that public service workers are being granted greater flexibility. But there are two main limitations to this move to greater genericism. The first is that multi-tasking in an era of cost cutting can look a lot like deprofessionalisation. Within social work, for example, concerns have been expressed about the downgrading of social work posts (by appointing brokers in their place, say) and the resulting loss of professional skills and knowledge.
A second limitation is that skills training continues to be sectoral, failing to catch up with the move to genericism….”
#BringBackOurGirls: Can Hashtag Activism Spur Social Change?
Nancy Ngo at TechChange: “In our modern times of media cycles fighting for our short attention spans, it is easy to ride the momentum of a highly visible campaign that can quickly fizzle out once another competing story emerges. Since the kidnappings of approximately 300 Nigerian girls by militant Islamist group Boko Haram last month, the international community has embraced the hashtag, “#BringBackOurGirls”, in a very vocal and visible social media campaign demanding action to rescue the Chibok girls. But one month since the mass kidnapping without the rescue of the girls, do we need to take a different approach? Will #BringBackOurGirls be just another campaign we forget about once the next celebrity scandal becomes breaking news?
#BringBackOurGirls goes global starting in Nigeria
Most of the #BringBackOurGirls campaign activity has been highly visible on Twitter, Facebook, and international media outlets. In this fascinating Twitter heat map created using the tool, CartoDB, featured in TIME Magazine, we can see a time-lapsed digital map of how the hashtag, “#BringBackOurGirls” spread globally, starting organically from within Nigeria in mid April.
The #BringBackOurGirls hashtag has been embraced widely by many public figures and has garnered wide support across the world. Michelle Obama, David Cameron, and Malala Yusafzai have posted images with the hashtag, along with celebrities such as Ellen Degeneres, Angelina Jolie, and Dwayne Johnson. To date, nearly 1 million people signed the Change.org petition. Countries including the USA, UK, China, Israel have pledged to join the rescue efforts, and other human rights campaigns have joined the #BringBackOurGirls Twitter momentum, as seen on this Hashtagify map.
Is #BringBackOurGirls repeating the mistakes of #KONY2012?
A great example of a past campaign where this happened was with the KONY2012 campaign, which brought some albeit short-lived urgency to addressing the child soldiers recruited by Joseph Kony, leader of the Lord’s Resistance Army (LRA). Michael Poffenberger, who worked on that campaign, will join us a guest expert in TC110: Social Media for Social Change online course in June 2013 and compare it the current #BringBackOurGirls campaign. Many have drawn parallels to both campaigns and warned of the false optimism that hyped social media messages can bring when context is not fully considered and understood.
According to Lauren Wolfe of Foreign Policy magazine, “Understanding what has happened to the Nigerian girls and how to rescue them means beginning to face what has happened to hundreds of thousands, if not millions, of girls over years in global armed conflict.” To some critics, this hashtag trivializes the weaknesses of Nigerian democracy that have been exposed. Critics of using social media in advocacy campaigns have used the term “slacktivism” to describe the passive, minimal effort needed to participate in these movements. Others have cited such media waves being exploited for individual gain, as opposed to genuinely benefiting the girls. Florida State University Political Science professor, Will H. Moore, argues that this hashtag activism is not only hurting the larger cause of rescuing the kidnapped girls, but actually helping Boko Haram. Jumoke Balogun, Co-Founder of CompareAfrique, also highlights the limits of the #BringBackOurGirls hashtag impact.
Hashtag activism, alone, is not enough
With all this social media activity and international press, what actual progress has been made in rescuing the kidnapped girls? If the objective is raising awareness of the issue, yes, the hashtag has been successful. If the objective is to rescue the girls, we still have a long way to go, even if the hashtag campaign has been part of a multi-pronged approach to galvanize resources into action.
The bottom line: social media can be a powerful tool to bring visibility and awareness to a cause, but a hashtag alone is not enough to bring about social change. There are a myriad of resources that must be coordinated to effectively implement this rescue mission, which will only become more difficult as more time passes. However, prioritizing and shining a sustained light on the problem, instead getting distracted by competing media cycles on celebrities getting into petty fights, is the first step toward a solution…”
An App That Makes It Easy to Pester Your Congress Member
Klint Finley in Wired: “Joe Trippi pioneered the use of social media as a fundraising tool. As campaign manager for Democratic presidential candidate Howard Dean in 2004, he started a trend that has reinvented that way politicians run for office. But he believes that many politicians are still missing out on the power of the internet once they’re elected.
“There’s been a lot of focus on winning campaigns, but there’s been less focus on governing,” Trippi says. “There are a lot of tools out there for campaigns to talk to voters, but not as many looking at how to give citizens and voters more impact on actual elected leaders in Congress.”
‘There’s been a lot of focus on winning campaigns, but there’s been less focus on governing.’
That’s why Trippi is working with an internet startup called Countable, which seeks to give citizens a greater voice in national politics. The company’s online service, which launches to the public today, gives you a simple and concise overview of the bills your national representatives are debating, and it lets you instantly send emails to these representatives, telling them how you would like them to vote.
Countable joins a growing wave of online tools that can improve the dialogue between citizens and representatives, including Madison, which lets you add your thoughts to both proposed bills and existing policies, and ThinkUp, a tool the White House uses to gauge popular sentiment through social media. The new service is most similar to Democracy OS, which lets governments and non-profits set up websites where people can discuss issues and vote on particular topics. But instead of building a platform that government operations must install on their own computer servers, Countable is offering a ready-made service.
In other words, you don’t have to wait for your representatives to adopt anything. All you have to do is sign up and start sending your thoughts to Congress….
One of the biggest challenges the company faces is providing enough information for citizens to develop informed opinions, without overwhelming them with details. “Fortunately, most pieces of legislation can be reasonably straight forward,” Myers says. “It’s when you get into complicated legislation with different political motivations associated with it that things get hard.”
For example, politicians often add amendments to bills that contain additional regulations or spending unrelated to the bill in question. Myers says that Countable will post updates to bills that have such riders. “Being able to call that out is actually a benefit in what we do,” he says.
The company is hiring writers from a variety of backgrounds, including politics and marketing, to ensure that the content is both accurate and understandable. Myers says the company strives to offer a balanced view of the pros and cons of each piece of legislation. “The editorial team represents multiple different political view points, but it will never be perfect,” he admits. To improve develop the editorial process, the company is also advised by former Reuters News publisher Andrew Goldner.
The other issue is e-mailing your representatives may not be that effective. And since Countable doesn’t do much to verify that you are who you say you are, a lobbyist or advocacy group could sign-up for multiple accounts and make it look like constituents feel more strongly about an issue than they actually do. But Myers says this isn’t much an issue, at least for now. “When talking with representatives, it’s not a major concern,” Myers says. “You can already e-mail your representatives without verifying your identity…”
The Emerging Science of Superspreaders (And How to Tell If You're One Of Them)
Emerging Technology From the arXiv: “Who are the most influential spreaders of information on a network? That’s a question that marketers, bloggers, news services and even governments would like answered. Not least because the answer could provide ways to promote products quickly, to boost the popularity of political parties above their rivals and to seed the rapid spread of news and opinions.
So it’s not surprising that network theorists have spent some time thinking about how best to identify these people and to check how the information they receive might spread around a network. Indeed, they’ve found a number of measures that spot so-called superspreaders, people who spread information, ideas or even disease more efficiently than anybody else.
But there’s a problem. Social networks are so complex that network scientists have never been able to test their ideas in the real world—it has always been too difficult to reconstruct the exact structure of Twitter or Facebook networks, for example. Instead, they’ve created models that mimic real networks in certain ways and tested their ideas on these instead.
But there is growing evidence that information does not spread through real networks in the same way as it does through these idealised ones. People tend to pass on information only when they are interested in a topic and when they are active, factors that are hard to take into account in a purely topological model of a network.
So the question of how to find the superspreaders remains open. That looks set to change thanks to the work of Sen Pei at Beihang University in Beijing and a few pals who have performed the first study of superspreaders on real networks.
These guys have studied the way information flows around various networks ranging from the Livejournal blogging network to the network of scientific publishing at the American Physical Society’s, as well as on subsets of the Twitter and Facebook networks. And they’ve discovered the key indicator that identifies superspreaders in these networks.
In the past, network scientists have developed a number of mathematical tests to measure the influence that individuals have on the spread of information through a network. For example, one measure is simply the number of connections a person has to other people in the network, a property known as their degree. The thinking is that the most highly connected people are the best at spreading information.
Another measure uses the famous PageRank algorithm that Google developed for ranking webpages. This works by ranking somebody more highly if they are connected to other highly ranked people.
Then there is ‘betweenness centrality’ , a measure of how many of the shortest paths across a network pass through a specific individual. The idea is that these people are more able to inject information into the network.
And finally there is a property of nodes in a network known as their k-core. This is determined by iteratively pruning the peripheries of a network to see what is left. The k-core is the step at which that node or person is pruned from the network. Obviously, the most highly connected survive this process the longest and have the highest k-core score..
The question that Sen and co set out to answer was which of these measures best picked out superspreaders of information in real networks.
They began with LiveJournal, a network of blogs in which individuals maintain lists of friends that represent social ties to other LiveJournal users. This network allows people to repost information from other blogs and to use a reference the links back to the original post. This allows Sen and co to recreate not only the network of social links between LiveJournal users but also the way in which information is spread between them.
Sen and co collected all of the blog posts from February 2010 to November 2011, a total of more than 56 million posts. Of these, some 600,000 contain links to other posts published by LiveJournal users.
The data reveals two important properties of information diffusion. First, only some 250,000 users are actively involved in spreading information. That’s a small fraction of the total.
More significantly, they found that information did not always diffuse across the social network. The found that information could spread between two LiveJournal users even though they have no social connection.
That’s probably because they find this information outside of the LiveJournal ecosystem, perhaps through web searches or via other networks. “Only 31.93% of the spreading posts can be attributed to the observable social links,” they say.
That’s in stark contrast to the assumptions behind many social network models. These simulate the way information flows by assuming that it travels directly through the network from one person to another, like a disease spread by physical contact.
The work of Sen and co suggests that influences outside the network are crucial too. In practice, information often spreads via several seemingly independent sources within the network at the same time. This has important implications for the way superspreaders can be spotted.
Sen and co say that a person’s degree– the number of other people he or her are connected to– is not as good a predictor of information diffusion as theorists have thought. “We find that the degree of the user is not a reliable predictor of influence in all circumstances,” they say.
What’s more, the Pagerank algorithm is often ineffective in this kind of network as well. “Contrary to common belief, although PageRank is effective in ranking web pages, there are many situations where it fails to locate superspreaders of information in reality,” they say….
Ref: arxiv.org/abs/1405.1790 : Searching For Superspreaders Of Information In Real-World Social Media”
Open Source Intelligence in the Twenty-First Century
New book by Christopher Hobbs, Matthew Moran and Daniel Salisbury: “This edited volume takes a fresh look at the subject of open source intelligence (OSINT), exploring both the opportunities and the challenges that this emergent area offers at the beginning of the twenty-first century. In particular, it explores the new methodologies and approaches that technological advances have engendered, while at the same time considering the risks associated with the pervasive nature of the Internet.
Drawing on a diverse range of experience and expertise, the book begins with a number of chapters devoted to exploring the uses and value of OSINT in a general sense, identifying patterns, trends and key areas of debate. The focus of the book then turns to the role and influence of OSINT in three key areas of international security – nuclear proliferation; humanitarian crises; and terrorism. The book offers a timely discussion on the merits and failings of OSINT and provides readers with an insight into the latest and most original research being conducted in this area.”
Table of contents:
PART I: OPEN SOURCE INTELLIGENCE: NEW METHODS AND APPROACHES
1. Exploring the Role and Value of Open Source Intelligence; Stevyn Gibson
2. Towards the discipline of Social Media Intelligence ‘ SOCMINT’; David Omand, Carl Miller and Jamie Bartlett
3. The Impact of OSINT on Cyber-Security; Alastair Paterson and James Chappell
PART II: OSINT AND PROLIFERATION
4. Armchair Safeguards: The Role of OSINT in Proliferation Analysis; Christopher Hobbs and Matthew Moran
5. OSINT and Proliferation Procurement: Combating Illicit Trade; Daniel Salisbury
PART III: OSINT and Humanitarian Crises
6. Positive and Negative Noise in Humanitarian Action: The OSINT Dimension; Randolph Kent
7. Human Security Intelligence: Towards a Comprehensive Understanding of Humanitarian Crises; Fred Bruls and Walter Dorn
PART IV:OSINT and Counter-terrorism
8. Detecting Events from Twitter: Situational Awareness in the Age of Social Media; Simon Wibberley and Carl Miller
9. Jihad Online: What Militant Groups Say about Themselves and What it Means for Counterterrorism Strategy; John Amble
Conclusion; Christopher Hobbs, Matthew Moran and Daniel Salisbury