tag:blogger.com,1999:blog-36542417742601370702024-02-20T20:36:39.769-08:00escouralAnonymoushttp://www.blogger.com/profile/15511432864734182961noreply@blogger.comBlogger120125tag:blogger.com,1999:blog-3654241774260137070.post-5605400754204912022012-10-28T11:24:00.000-07:002012-11-16T18:36:11.571-08:00Conference Tools for TwitterRecent experience of following (and contributing to) Twitter stream at the annual meetings of the American Sociological Association inspired a number of ideas (not all original, I'm sure, and some probably already implemented) in connection with Twitter and conferences:<br /><ol><li>Conference organizers should devise and disseminate a simple hashtag schemes for sessions/presentations.</li><li>Set up scheduled tweets that announce sessions, say, 15 minutes ahead of time. Tweet can contain a link to web page with detailed information about session.</li><li>Presenters can submit brief, say 5 to 10, tweet summary of the points they are making and these can be automatically scheduled to be tweeted during the talk.</li><li>If talks are being live streamed, start of each talk can be marked by a tweet with URL to the stream. Major point tweets could be synced to location in recorded video/audio.</li><li>Develop an app that aggregates and archives live tweets of presentations for live and followup discussion.</li></ol><div>What would you add?</div>Anonymoushttp://www.blogger.com/profile/15511432864734182961noreply@blogger.com1tag:blogger.com,1999:blog-3654241774260137070.post-31409752872767932992012-10-28T11:06:00.000-07:002012-11-16T18:36:11.578-08:00Sociology of Information Nuggets<br />Elections and a three course semester have crowded out blogging over last few months. And so, the blogger's cop out of pointers to some recent interesting reads:<br /><br /><a href="http://www.mayaalexandri.com/" target="_blank">Maya Alexandri</a> has a fun post, "<a href="http://www.mayaalexandri.com/mayas_blog/2010/04/what-thomas-cromwell-had-in-common-with-the-dewey-decimal-system.html" target="_blank">What Thomas Cromwell had in common with the Dewey decimal system</a>" calling attention the theme of information revolutions as noted in the Joan Acocella <a href="http://www.newyorker.com/arts/critics/books/2009/10/19/091019crbo_books_acocella?currentPage=all" target="_blank">review of Hilary Mantel's <i>Wolf Hall</i> in The New Yorker</a>. Alexandri and Acocella note interesting similarity of Cromwell's time and our own as eras in which "information is being radically reorganized." It's precisely the desire to clarify such recapitulations that drives my own work on the sociology of information.<br /><br /><br /><a href="http://blog.semilshah.com/" target="_blank">Semil Shah</a> offers a <a href="http://techcrunch.com/2012/10/28/iterations-its-delicate-but-potent/" target="_blank">panegyric post</a> about <a href="http://timehop.com/" target="_blank">Timehop</a>, an app that automatically sends you a photo of what you were doing a year ago today. It purports, among other things, to be a "solution" to the problem of having boxes of memories that you either never find the time to look at or into which you unintentionally dump hour or hour of time you don't have. Shah's optimistic take is<br /><blockquote class="tr_bq">The carousel of old slides, the cigar box of warped pictures, and the Instagrams you’ve taken, now in your pocket, delivered to you in just the right way.</blockquote>There are some great research questions swirling around issues like personal memory, artifacts, the externalization and automation of recall, search as every-ready reconstruction of the past. Stay tuned.<br /><br />Anonymoushttp://www.blogger.com/profile/15511432864734182961noreply@blogger.com0tag:blogger.com,1999:blog-3654241774260137070.post-44724816041780278942012-04-20T18:27:00.000-07:002012-11-16T18:36:11.583-08:00Scoops in Journalism and Everyday Life<br />Jay Rosen has a post today titled "<a href="http://jayrosen.posterous.com/four-types-of-scoops" target="_blank">Four Types of Scoops</a>" that will surely make it into my sociology of information book. The four types are the "enterprise scoop" where the reporter who gets the scoop gets it by doing the "finding out." The information may be deliberately hidden or obscured by routine practice, but it would not have become known to the public without the work of the reporter. Then there is its opposite, the the "ego scoop": the news would have come out anyway, but the scooper gets (or provokes) a tip or equivalent. The third type Rosen calls the "trader's" scoop where early info has instrumental value -- as in a stock tip. Finally there is the "thought scoop." This is when the writer puts two and two together or otherwise "connects the dots" to, as he says, "apprehend--name and frame--something that's happening out there before anyone else recognizes it."<br /><br />The information order of everyday life is conditioned by information exchanges that might be similarly categorized. But even before that we'd notice a distinction between exchanges that are NOT experiences as scoops -- I think there are two extremes: information passed on bucket-brigade style with no claim at all to having generated it or deserving any credit for its content or transmission. "Hey, they've run out of eggs, pass it on, eh?" and statements of a truly personal nature: "I'm not feeling well today" that do not reflect one's position or location or worth in the world. <br /><br />Between these there are all manner of instances in which people play the scoop game in everyday interaction. The difference between an ordinary person and a reporter in this regard is that the reporter's scoop is vis a vis "the rest of the media" while the scoopness of the person's scoop is centered in the information ecology of the recipient. We have all met the inveterate ego scooper who moves from other to other to other trying to stay one step ahead of the diffusing information so that s/he can deliver the "scoop" over and over. And the enterprising gossip who pries information loose from friends and acquaintances and is always ready with the latest tidbit. In everyday interaction the wielder of the traders' scoop often generates the necessary arbitrage because others are willing to "pay" for information they can use as ego scoops. Alas, as in the media, the thought scoop is probably the rarest form in everyday life too. It's probably less self-conscious in everyday interaction and too more ephemeral which is too bad. Those conversational insights are probably more often lost than their counterparts in "print."Anonymoushttp://www.blogger.com/profile/15511432864734182961noreply@blogger.com0tag:blogger.com,1999:blog-3654241774260137070.post-41451658506885449992012-04-08T12:36:00.000-07:002012-11-16T18:36:11.589-08:00Tomorrow's Social Science Today? By Techies?<span style="color: #274e13; font-size: x-small;"><i>If you generate the data, the analysts will come. And more and more of the technologies of everyday life <a href="http://soc-of-info.blogspot.com/2011/04/data-exhaust-and-informational.html" target="_blank">generate data, lots of it</a>. "Big data" takes big tools and big tools cost big bucks. The science of big data is mostly social science but, for the most part, it's not being done by social scientists. What's left out when social scientists leave themselves out of the conversation? And what happens to the funding for non-big-data social science when resource-hungry projects like this emerge? And what will be the effect on the epistemological status of non-big-data social science?</i></span><br /><br /><span style="font-family: 'Helvetica Neue', Arial, Helvetica, sans-serif; font-size: xx-small;"><i>from the New York Times...</i></span><br /><h6 class="kicker" style="font-family: arial, helvetica, sans-serif; font-weight: normal; line-height: 1.4em; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; text-align: left; text-transform: uppercase;"> <span style="font-size: xx-small;">THE BAY CITIZEN</span></h6>Berkeley Group Digs In to Challenge of Making Sense of All That Data <span style="font-size: xx-small;"><nyt_byline style="color: #333333; font-family: georgia, 'times new roman', times, serif; line-height: 15px; text-align: left;"><span itemprop="creator" itemscope="" itemtype="http://schema.org/Person"></span></nyt_byline></span><br /><h6 class="byline" itemprop="name" style="color: grey; font-family: arial, helvetica, sans-serif; font-weight: normal; line-height: 1.2em; margin-bottom: 2px; margin-left: 0px; margin-right: 0px; margin-top: 2px;"> <span style="font-size: xx-small;"><span itemprop="creator" itemscope="" itemtype="http://schema.org/Person">By JEANNE CARSTENSEN</span></span></h6><span style="font-size: xx-small;"><span itemprop="creator" itemscope="" itemtype="http://schema.org/Person"></span><span style="color: #333333; font-family: georgia, 'times new roman', times, serif; line-height: 15px; text-align: left;"></span></span><br /><h6 class="dateline" style="color: grey; font-family: arial, helvetica, sans-serif; font-weight: normal; line-height: 1.2em; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; text-align: left;"> <span style="font-size: xx-small;">Published: April 7, 2012</span></h6><br />"It comes in “torrents” and “floods” and threatens to “engulf” everything that stands in its path.<br /><br /><div class="separator" style="clear: both; text-align: center;"></div><div class="separator" style="clear: both; text-align: center;"><a href="http://baycitizen.org/" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;" target="_blank"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYTyEfl-Ub5Djfa8G5Nx1-BxDQzK2rEhjn0IVi4jFzKnzcpzSLFr3Bb-JoXiyGtYjs6Ndfxqw6LQR6oXrkEMcITaSFuJegkeGhPCGhq_eQzUDMprYsXdy3SQclrUNvkToTcEBltgXv-lrQ/s1600/baycitizen.gif" /></a></div>No, it is not a tsunami, it is Big Data, the incomprehensibly large amount of raw, often real-time data that keeps piling up faster and faster from scientific research, social media, smartphones — virtually any activity that leaves a digital trace.<br /><br />The sheer size of the pile (measured in petabytes, one million gigabytes, or even exabytes, one billion gigabytes) combined with its complexity has threatened to overwhelm just about everybody, including the scientists who specialize in wrangling it. “It’s easier to collect data,” said Michael Franklin, a professor of computer science at the University of California, Berkeley, “and harder to make sense of it.”<br /><br /><div style="text-align: center;"><a href="http://www.nytimes.com/2012/04/08/us/berkeley-group-tries-to-make-sense-of-big-data.html" target="_blank"><span style="color: red; font-family: Arial, Helvetica, sans-serif;"><b>Read full article...</b></span></a></div>Anonymoushttp://www.blogger.com/profile/15511432864734182961noreply@blogger.com0tag:blogger.com,1999:blog-3654241774260137070.post-46989256408500812742012-03-02T22:32:00.000-08:002012-11-16T18:36:11.595-08:00Is There a Right to Data Collection?What's more socially harmful: politicians not knowing what sound bite will play well or voters being mislead by scurrilous misinformation?<br /><br />New Hampshire is one state where legislators listened when voters complained about "<a href="http://en.wikipedia.org/wiki/Push_poll" target="_blank">push-polling</a>" -- the practice of making campaign calls that masquerade as surveys or polls. Perhaps the most infamous example is George Bush's campaign calling South Carolinians to ask what they think if John McCain were to have fathered an illegitimate black baby.<br /><br />The gist of M. D. Shear's article, <span style="color: black;"><a href="http://www.nytimes.com/2012/03/02/us/politics/law-has-polling-firms-leery-of-new-hampshire.html" style="color: black;" target="_blank">Law Has Polling Firms Leery of Work in New Hampshire</a>" (NYT 1 March 2012)</span> is that pollsters and political consultants are whining that "legitimate" operations are getting gun-shy about polling in New Hampshire for fear of being fined. Actual surveys won't get done, they suggest, because poorly worded legislation creates too much illegitimate legal liability.<br /><br />They do not take issue with what the law requires and some even call it well-intentioned. Paragraph 16a of section 664 of Title 53 of New Hampshire statutes requires those who administer push-polls to identify themselves as doing so on behalf of a candidate or issue. In other words, if that's what you are up to, you need to say so.<br /><br />The problem, they say, is that the law is poorly written -- good intentions gone bad, they suggest. So, what does the statute actually say? Not so ambiguous, really. It says if you call pretending to be taking a survey but really you are spreading information about opposition candidates then you are push-polling:<br /><br /><span style="font-family: 'Courier New', Courier, monospace;"><a href="http://law.justia.com/codes/new-hampshire/2010/titlelxiii/chapter664/section664-2/" target="_blank">XVII. "Push-polling" means</a>: </span><br /><ol style="list-style-type: lower-alpha;"><li><span style="font-family: 'Courier New', Courier, monospace;">Calling voters on behalf of, in support of, or in opposition to, any candidate for public office by telephone; and</span></li><li><span style="font-family: 'Courier New', Courier, monospace;">Asking questions related to opposing candidates for public office which state, imply, or convey information about the candidates' character, status, or political stance or record; and</span></li><li><span style="font-family: 'Courier New', Courier, monospace;">Conducting such calling in a manner which is likely to be construed by the voter to be a survey or poll to gather statistical data for entities or organizations which are acting independent of any particular political party, candidate, or interest group.</span></li></ol>And so, the question arises: why aren't pollsters themselves taking steps to stamp out the practice? One supposes the answer is that they still want to use it, even if the "good guys" would not stoop to the level of sleaziness that Bush and Lee Atwater practiced.<br /><br />Interestingly, one of the objections that the pollsters raised was that "complying with the law by announcing the candidate sponsoring the poll would corrupt the data being gathered." It's interesting because they don't think that constantly adjusting question wording and techniques that are technically push-polling even if they could stay inside the New Hampshire law would corrupt the data.<br /><br />But this brings me to my real point. As a practicing social scientist I am consistently disheartened and often angered at the abuse of survey research engaged in by political parties and organizations. I receive "surveys" from the DNC, DCCC, Greenpeace, Sierra Club, MoveOn.org, etc. etc. that triply insult me:<br /><br /><ul><li>They are, in fact, often push-polls (if gentle ones) whose real purpose is to inform and incite not collect data.</li><li>They are couched disingenuously in terms of providing me an opportunity for input, to have my voice heard.</li><li>As research instruments they are almost always C- or worse, violating the most basic tenets of survey construction.</li></ul><br />Perhaps I should just humor them and wink since we do both know what's really going on. Sometimes the political actor in me is content to do so. But at other times the information order pollution that they represent really gets to me. These things corrupt the data of other legitimate research efforts. If the results are used, they amplify the error in the information order. These things undermine social information trust. They cheapen the very idea of opinion research. Imagine a certain amount of what passes as clinical trials is really just PR for pharmaceutical companies. Or imagine that the "high stakes testing" used to study the education system was really just a ploy to indoctrinate children. Or that marine biologists were just sending a message to the mollusks they study.<br /><br />As a consultant helping organizations do research I used to ask "are you trying to find out something or are you trying to show something?" To this we could add "or are you just putting on a show?"<br /><br />There's something disturbing when an industry like political polling can't do better than suggest that the one state that has taken steps to address a real democracy-threatening practice within that industry is somehow "the problem." A republican pollster whined that the law has “a harmful effect on legitimate survey research and message testing that really impairs our ability to do credible polling,” as if we should care. It doesn't take a Ph.D. to see that a little ignorance on the part of politicians about attitudes in New Hampshire as the price for stopping a practice that corrupts public deliberation is a tradeoff well worth making.Anonymoushttp://www.blogger.com/profile/15511432864734182961noreply@blogger.com0tag:blogger.com,1999:blog-3654241774260137070.post-29443476209127574452012-02-18T07:11:00.000-08:002012-11-16T18:36:11.600-08:00Should Your Company Tell You Your SecretsNice sociology of info two-fer in <a href="http://www.forbes.com/sites/kashmirhill/2012/02/16/how-target-figured-out-a-teen-girl-was-pregnant-before-her-father-did/">Forbes article about Target </a> being able to detect pregnancy based on purchases (see also "<a href="http://www.nytimes.com/2012/02/19/magazine/shopping-habits.html">How Companies Learn Your Secrets"in NYT</a>). The first connection is obvious: data mining lets company detect information "given off" by ordinary behavior. Second is the notification question. In the article the "story" is that Target outs young woman to her dad by sending targeted circular for maternity supplies. <br /><br />So now we are in the situation where data mining companies have to interrogate their notification obligations just like doctors, lawyers, and spouses. I will work up an analysis in subsequent post. I anticipate insights about how corporate-ness of knower figures into the notification norm calculation.Anonymoushttp://www.blogger.com/profile/15511432864734182961noreply@blogger.com0tag:blogger.com,1999:blog-3654241774260137070.post-63561964962925457322012-02-13T10:48:00.000-08:002012-11-16T18:36:11.606-08:00Is Your Information Your Business?The Business section is fast becoming the sociology of information section.<br /><br />In "<a href="http://www.nytimes.com/2012/02/13/business/media/twitter-is-all-in-good-fun-until-it-isnt.html">Twitter Is All in Good Fun, Until It Isn’t</a>," David Carr writes about Roland Martin being sanctioned by CNN because of controversial Twitter posts. On the Bits page, Nick Bolton's article "<a href="http://bits.blogs.nytimes.com/2012/02/12/disruptions-so-many-apologies-so-much-data-mining/?scp=1&sq=so%20many%20apologies&st=Search">So Many Apologies, So Much Data Mining</a>," tells of David Morin, head of the company that produces the social network app, <a href="https://path.com/">Path</a> ("The smart journal that helps you share life with the ones you love."), that got into hot water last week when a programmer in Singapore noticed it hijacked users' address books without asking. On page B3 we find a 14 inch <a href="http://www.nytimes.com/2012/02/13/business/media/pew-study-finds-ads-on-news-web-sites-are-missing-users.html">article by T. Vega about new research from Pew</a> about how news media websites fail to make optimal use of online advertising.<br /><br />More on those in future posts. Right next to the Pew article, J. Brustein's "<a href="http://www.nytimes.com/2012/02/13/technology/start-ups-aim-to-help-users-put-a-price-on-their-personal-data.html">Start-Ups Seek to Help Users Put a Price on Their Personal Data</a>" profiles the startup "<a href="http://www.personal.com/">Personal</a>" -- one of several that are trying to figure out how to let internet users capitalize on their personal data by locking it up in a virtual vault and selling access bit by bit.<br /><br />This last one is of particular interest to me. Back in the early 90s I floated an idea that alarmed my social science colleagues: why not let study participants own their data? The idea was inspired by complaints that well-meaning researchers at Yale, where I was a graduate student at the time, routinely made their careers on the personal information they, or someone else, had collected from poor people in New Haven. The original source of that complaint was a community activist who had a more colorful way of describing the relationship between researcher and research subject.<br /><br />The idea would be to tag data garnered in surveys and other forms of observation with an ID that could be matched with an <a href="http://www.cis.upenn.edu/~spyce/oct03/posters/vitaly-escrowsingle.pdf">escrow database</a> (didn't really exist then, but now a part of "<a href="http://en.wikipedia.org/wiki/Software_as_a_service">Software as a Service</a> (Saas)"). When a researcher wanted to make use of data, she or he would include in the grant proposal some sort of data fee that would be delivered to the intermediary and then distributed as data royalties to the individuals the data concerned. The original researcher would still offer whatever enticements to participation (a bit like an advance for a book). The unique identifier held by the intermediary would allow data linking producing a valuable tool for research and an opportunity for research subjects to continue to collect royalties as their data was "covered" by new research projects just as a song writer does.<br /><br />The most immediate objections were technical -- real but solvable, but then came the reasoned objections. This would make research more expensive! Perhaps, but another way to see this is that it would be a matter of more fully accounting for social costs and value, and for recognizing that researchers were taking advantage of latent value in their act of aggregation (similar to issues raised about Facebook recently). Another objection was that the purpose of the research was already to help these people. True enough. But why should they bear all the risk of that maybe working out, maybe not? <br /><br />And so the conversation continued. I'm not sure I like the idea of converting personal information into monetary value; I think it sidesteps some important human/social/cultural considerations about privacy, intimacy, and the ways that information behavior is integral to our sense of self and and sense of relationships. But I do think it is critically important that we think carefully about the information order and how the value of information is created by surveillance and aggregation and how we want to think about what happens to the information we give, give up, and give off.<br /><br /><b>Related</b><br /><br /><ul><li>Business Insider. 2011. "<a href="http://e.businessinsider.com/view/pyl.h8/10d7b4d0">Here's How Much A Unique Visitor Is Worth</a>"</li><li>Morey, Tim. 2011. "<a href="http://designmind.frogdesign.com/blog/what039s-your-personal-data-worth.html">What's Your Personal Data Worth?</a>" DesignMind blog. January 18, 2011</li><li>Moody, Glyn. 2010. "<a href="http://opendotdotdot.blogspot.com/2010/01/what-nothing-to-hide-is-hiding.html">'What "Nothing to Hide' is Hiding</a>," on Open... blog 11 Jan 2010.</li><li>Muffett, Alec. 2010. "<a href="http://dropsafe.crypticide.com/article/3758">Understanding Your Personal Information’s Value = The End of 'Nothing To Hide'</a>" dropsafe blog 13 Jan 2010.</li><li><a href="http://blog.personal.com/">Personal.com Blog</a></li><li>Reger, Joe. 2005. "<a href="http://www.joereger.com/entry-logid1-eventid4786-The-Time-Value-of-Personal.log">The Time Value of Personal Information</a>," JoeReger.com blog 27 Dec 2005.</li></ul>Anonymoushttp://www.blogger.com/profile/15511432864734182961noreply@blogger.com0tag:blogger.com,1999:blog-3654241774260137070.post-40133513411449868772012-01-22T17:34:00.000-08:002012-11-16T18:36:11.612-08:00Prying Information Loose and Dealing with Loose InformationA sociology of information triptych this morning. Disclosure laws that fail to fulfill their manifest/intended function, the secret work of parsing public information, and the pending capacity to record everything all bear on the question of the relationship between states and information.<br /> <br />In a 21 Jan 2012 NYT article, "<a href="http://www.nytimes.com/2012/01/22/sunday-review/hard-truths-about-disclosure.html">I Disclose ... Nothing</a>," Elisabeth Rosenthal (<a href="https://twitter.com/#!/nytrosenthal">@nytrosenthal</a>) suggests that despite increasing disclosure mandates we may not, in fact, be more informed. Among the obviating forces are <a href="http://soc-of-info.blogspot.com/search?q=information+overload">information overload</a>, dearth of interpretive expertise, tendency of organizations to hide behind "you were told...", formal rules provide organizations with blueprint for how to play around with technicalities (as, she notes, Republican PACs have done, using name changes and re-registration to "reset" their disclosure obligation clocks), routinization (as in the melodic litanies of side-effects in drug adverts), and the simple fact that people are not in a position to act on information even it is abundantly available and unambiguous. On the other side, the article notes that there is a whole "industry" out there -- journalists, regulators, reporters who can data mine the disclosure information even if individuals cannot take advantage.<br /><br />Rachel Martin's (<a href="https://twitter.com/#!/rachelnpr">@rachelnpr</a>) piece on NPR's Weekend Edition Sunday, <a href="http://www.npr.org/2012/01/22/145587161/cia-tracks-public-information-for-the-private-eye">CIA Tracks Public Information For The Private Eye</a> describes almost the mirror image of this: how intelligence agencies are building their infrastructure for trying to find patterns in and making sense of the gadzillions of bits of public information that just sits their for all to see. It's another case that hints at an impossibility theorem about "<a href="http://soc-of-info.blogspot.com/2010/01/those-damn-unconnected-dots-again-rough.html">connecting the dots</a>" <i>a priori</i>.<br /><br />And finally, in another NPR story, "<a href="http://www.npr.org/2012/01/22/145599139/technological-innovations-help-dictators-see-all">Technological Innovations Help Dictators See All</a>" Rachel Martin interviews <a href="http://www.brookings.edu/experts/villasenorj.aspx">John Villasenor</a> about his paper, "<a href="http://www.brookings.edu/papers/2011/1214_digital_storage_villasenor.aspx">Recording Everything: Digital Storage as an Enabler of Authoritarian Governments</a>" on the idea that data storage has become so inexpensive that there is no reason for governments (they focus on authoritarian ones, but no reason to limit it) not to collect everything (even if, as the first two stories remind us, they may currently lack the capacity to do anything with it). I if surveillance uptake and <a href="http://soc-of-info.blogspot.com/2010/02/technologically-induced-social.html">data rot</a> will prove to be competing tendencies.<br /><br /><br />The first piece suggests research questions: what are the variables that determine whether disclosure is "useful"? what features of disclosure rules generate cynical work-arounds? if "<a href="http://soc-of-info.blogspot.com/2009/09/is-more-information-always-better-file.html">more is not always better</a>," what is? can we better theorize the relationship between "knowing," open-ness, transparency, disclosure and democracy than we have so far?<br /><br />The second piece really cries out for an essay capturing the irony of how the information pajamas get turned inside out with the spy agency trying to see what's in front of everyone (we are reminded in a perverse sort of way of Poe's "<a href="http://www.gutenberg.org/dirs/2/5/5/2/25525/25525-h/files/2148/2148-h/2148-h.htm#purloin">The Purloined Letter</a>"). Perhaps we'll no longer associate going "under cover" with the CIA.<br /><br />And the alarm suggested in the third piece is yet another entry under what I (and maybe others) have called the informational inversion -- when the generation, acquisition, and storage of information dominates by orders of magnitude our capacity to do anything with it.Anonymoushttp://www.blogger.com/profile/15511432864734182961noreply@blogger.com0tag:blogger.com,1999:blog-3654241774260137070.post-41086891624968504712012-01-08T13:14:00.000-08:002012-11-16T18:36:11.618-08:00Journalism and Research AgainLots of Twitter and blog activity in response to <a href="http://www.nytimes.com/2012/01/06/education/big-study-links-good-teachers-to-lasting-gain.html">NYT article</a> about Chetty, Friedman, and Rockoff research paper on effects of teachers on students' lives. <br /><br />No small amount of the commentary is about how when journalists pick "interesting" bits out of research reports to construct a "story" they often create big distortions in the social knowledge-base. <br /><br />So what can reporters do when trying to explain the significance of new research, without getting trapped by a poorly-supported sound bite?<br /><br />Sherman Dorn has an excellent post on the case, "<a href="http://shermandorn.com/wordpress/?p=4393">When reporters use (s)extrapolation as sound bites</a>," that ends with some advice:<br /><blockquote><br /><ol><li><i>"If a claim could be removed from the paper without affecting the other parts, it is more likely to be a poorly-justified (s)implification/(s)extrapolation than something that connects tightly with the rest of the paper."</i></li><li><i>"If a claim is several orders of magnitude larger than the data used for the paper (e.g., taking data on a few schools or a district to make claims about state policy or lifetime income), don’t just reprint it. Give readers a way to understand the likelihood of that claim being unjustified (s)extrapolation."</i></li><li><i>"More generally, if a claim sounds like something from Freakonomics, hunt for a researcher who has a critical view before putting it in a story."</i></li></ol></blockquote><br />See also <a href="http://shankerblog.org/?p=4708">Matthew Di Carlo on ShankerBlog</a>, <a href="http://schoolfinance101.wordpress.com/">Bruce Baker on SchoolFinance 101</a>, and <a href="http://cedarsdigest.wordpress.com/2012/01/07/economists-to-teachers-weve-dropped-the-deselection-and-moved-straight-to-fire-em/">Cedar Reiner on Cedar's Digest</a>Anonymoushttp://www.blogger.com/profile/15511432864734182961noreply@blogger.com0tag:blogger.com,1999:blog-3654241774260137070.post-84858044138115645312011-12-30T18:16:00.000-08:002012-11-16T18:36:11.624-08:00New Book on Data JournalismSimon Rogers has a new book called <i><a href="http://www.guardian.co.uk/news/datablog/2011/dec/27/facts-sacred-guardian-shorts-ebook">Facts are Sacred: The power of data</a></i> coming out as a part of the <a href="http://www.guardian.co.uk/info/series/guardian-shorts">Guardian Shorts</a> series with a Kindle Edition available now from <a href="http://www.amazon.co.uk/Facts-are-Sacred-Guardian-ebook/dp/B006PI9PQG">Amazon.UK</a> and in January from <a href="http://www.amazon.com/Facts-are-Sacred-Guardian-ebook/dp/B006PI9PQG">Amazon</a> in the US.<br /><br /><div style="text-align: left;">I was turned on to this project when I stumbled across <a href="http://www.guardian.co.uk/uk/2011/dec/07/how-twitter-spread-rumours-riots">this excellent collaborative project visualizing the spread of rumor via Twitter</a> during last summer's London riots.</div><div style="text-align: center;"><br /></div><div style="text-align: center;"><object data="http://content.screencast.com/users/DJJR/folders/Jing/media/ec9305a2-5137-4b73-84c8-d08d84ae3202/jingh264player.swf" height="204" id="scPlayer" type="application/x-shockwave-flash" width="284"><param name="movie" value="http://content.screencast.com/users/DJJR/folders/Jing/media/ec9305a2-5137-4b73-84c8-d08d84ae3202/jingh264player.swf" /><param name="quality" value="high" /><param name="play" value="true" /><param name="bgcolor" value="#eeeecc" /><param name="flashVars" value="thumb=http://content.screencast.com/users/DJJR/folders/Jing/media/ec9305a2-5137-4b73-84c8-d08d84ae3202/FirstFrame.jpg&containerwidth=284&containerheight=204&content=http://content.screencast.com/users/DJJR/folders/Jing/media/ec9305a2-5137-4b73-84c8-d08d84ae3202/2011-12-30_1802.mp4&blurover=false" /><param name="allowFullScreen" value="true" /><param name="loop" value="true" /><param name="scale" value="showall" /><param name="allowScriptAccess" value="always" /><param name="base" value="http://content.screencast.com/users/DJJR/folders/Jing/media/ec9305a2-5137-4b73-84c8-d08d84ae3202/" /><iframe type="text/html" frameborder="0" scrolling="no" style="overflow:hidden;" src="http://www.screencast.com/users/DJJR/folders/Jing/media/ec9305a2-5137-4b73-84c8-d08d84ae3202/embed" height="204" width="284" ></iframe></object></div><div style="text-align: center;"><br /></div><div style="text-align: left;">For the last hour or so I've been having that "I should have written this book" feeling -- not a pleasant feeling, but a recommendation to be sure. A nice feature of the book is that it blends boosterism and manifesto with how to and reportage on best practices. That brings it in as a book that won't be perfect for anyone, but has something for each of it's several potential audiences. </div>Anonymoushttp://www.blogger.com/profile/15511432864734182961noreply@blogger.com0tag:blogger.com,1999:blog-3654241774260137070.post-87355826664145865812011-12-13T22:24:00.000-08:002012-11-16T18:36:11.630-08:00Google Knol into the Dustbin of E-historyAfter 15 weeks of non-stop work, a moment for thinking about something other than classes and budgets came available today. Recently, while googling about, I became re-acquainted with the idea of a "knol" -- a unit of knowledge -- and the associated <a href="http://knol.google.com/">web service that Google</a> has run these last number of years. <b>And</b> the fact that it is going away. Or rather it is evolving: into something called <a href="http://annotum.org/">Annotum</a> which describes itself this way:<br /><blockquote class="tr_bq">Develop a simple, robust, easy-to-use authoring system to create and edit scholarly articles<br />Deliver an editorial review and publishing system that can be used to submit, review, and publish scholarly articles</blockquote>The google knol thing has been around since 2007. The <a href="http://googleblog.blogspot.com/2008/07/knol-is-open-to-everyone.html">initial beta announcement</a> described the thithis way<br /><blockquote class="tr_bq">Knols are authoritative articles about specific topics, written by people who know about those subjects.</blockquote>I remember, now, encountering it back in the day -- I may even have written some knols -- but it didn't stay on the radar screen for long. It was portrayed at the time as an alternative to Wikipedia -- with it's distinguishing characteristic being "authorship" :<br /><blockquote>The key principle behind Knol is authorship. Every knol will have an author (or group of authors) who put their name behind their content. It's their knol, their voice, their opinion. We expect that there will be multiple knols on the same subject, and we think that is good (<a href="http://googleblog.blogspot.com/2008/07/knol-is-open-to-everyone.html">googleblog</a>, 2008).</blockquote>The divergence between Wikipedia's modus operandi and that of Knol (now Annotum) provides a nice case study jumping off point for thinking aboutf how we are figuring out the relationship between crowd sourcing and authorship, peer production, open source, intellectual authority, and how platform as institution feeds into how we think about content legitimacy.<br /><br />Wikipedia harvests (harnesses, makes possible the emergence or realization) of a potentiality that, in a sense, has always been there, but represents a completely new mode of knowledge aggregation and access. A project like Knol or Annotatum, on the other hand, is about removing the friction from existing processes in a way that makes more of what's already done happen more easily.<br /><br />Both approaches thumb their nose at property-based organizational middle-men as the arbiter of intellectual legitimacy, but exploring the contrast between them is instructive.<br /><br />I am, of course, not the first to think about this. One <a href="http://knol.google.com/k/reginald-patterson/knol-versus-wikipedia/t7omkuodtii0/3#">knol author</a> suggested that the real point of contrast is "Wikipedia does not allow the visionary or individualistic type of knowledge to be developed, because Wikipedia does not allow original content." And if you google "knol vs. wikipedia" you'll find lots of others -- my initial, quick and dirty assessment is that most are boosters for one or the other approach but I'm guessing there will be some grist for the mill for the chapter in The Sociology of Information where I'll talk about the social organization of information aggregation. <br /><br />Bottom line: I'm back on the job.Anonymoushttp://www.blogger.com/profile/15511432864734182961noreply@blogger.com0tag:blogger.com,1999:blog-3654241774260137070.post-60057175438332114002011-09-20T10:57:00.000-07:002012-11-16T18:36:11.702-08:00Gossip, CMC, and Tight Knit Communities<span class="Apple-style-span" style="background-color: white; font-family: Georgia, serif; font-size: 14px;"></span><br /><div class="bylineRegion" id="section" style="color: grey; font-family: Arial, Helvetica, sans-serif; font-size: 11px; padding-bottom: 2px; text-transform: uppercase;">U.S.</div><div class="nyt_headline" id="nyt_headline" style="color: #333333; font-size: 15px; font-weight: bold; padding-bottom: 3px;"><a href="http://www.nytimes.com/2011/09/20/us/small-town-gossip-moves-to-the-web-anonymous-and-vicious.html">In Small Towns, Gossip Moves to the Web, and Turns Vicious</a></div><div class="byline" id="byline" style="color: #999999; font-family: Arial, Helvetica, sans-serif; font-size: 11px;">By <a class="meta-per" href="http://topics.nytimes.com/top/reference/timestopics/people/s/a_g_sulzberger/index.html?inline=nyt-per" rel="author" style="color: #004276; text-decoration: none;" title="More Articles by A. G. Sulzberger">A. G. SULZBERGER</a></div><div class="timestamp" id="pubdate" style="color: grey; font-family: Arial, Helvetica, sans-serif; font-size: 11px;">Published: September 19, 2011</div><div class="story" id="summary" style="clear: left; color: #333333; font-size: 12px; line-height: 15px; padding-bottom: 30px; padding-left: 0px; padding-right: 0px; padding-top: 2px;">As more people share gossip over the Internet rather than over coffee and eggs, anonymous, and startlingly negative, posts have provoked fights, divorce and worse.</div>Anonymoushttp://www.blogger.com/profile/15511432864734182961noreply@blogger.com0tag:blogger.com,1999:blog-3654241774260137070.post-67856708752794474602011-09-11T13:06:00.000-07:002012-11-16T18:36:11.775-08:00Good eye/mind catches logical fallacy in WSJ Analysis<div>Jean Whit notes that the authors of this piece about Wall Street Journal number crunching about sovereign debt default and bond ratings, <a href="http://www.programbusiness.com/News/WSJ-Analysis-Rating-Firms-Not-Effective-at-Predicting-Government-Defaults">WSJ Analysis: Rating Firms Not Effective at Predicting Government Defaults</a>, got their analysis backwards. A classic case of sampling on the dependent variable or percentaging in the wrong direction: how many of the defaults had a given rating rather than how many with a given rating end up defaulting. See Jean's comment at bottom of post.</div>Anonymoushttp://www.blogger.com/profile/15511432864734182961noreply@blogger.com0tag:blogger.com,1999:blog-3654241774260137070.post-74038141155199316422011-09-11T12:55:00.000-07:002012-11-16T18:36:11.846-08:00GPS, Orwell, and the 4th AmendmentThe 9/11 anniversary reminds us, among all the other things, of the questions of government surveillance that have arisen in the last decade, some related to terrorism, some reflecting challenges raised by new technologies, and many at the intersection of these.<br /><br />This fall, the US Supreme Court will consider whether law enforcement should be able to attach a GPS tracking device on a vehicle without a warrant. Adam Liptak reports on the issue in "<a href="http://www.nytimes.com/2011/09/11/us/11gps.html">Court Case Asks if ‘Big Brother’ Is Spelled GPS</a>" in today's New York Times. Lower courts have ruled in different directions on the question.<br /><br />One way to think about it is in terms of aggregating information and whether there's an emergent property that changes how we would classify obtaining, possessing, or using information. Consider, for example, one's daily round. Leave the house at 7:30, stop for coffee, pick up the dry-cleaning, get stuck in traffic, arrive at work, park in the lot over behind the pine trees, etc. All of these are done in public with no expectation of privacy. And then it all happens again tomorrow, and tomorrow and tomorrow. Except the dry cleaning stop is only made on Mondays and every other Friday there's a stop at a bar on the edge of downtown. If there is a GPS attached to your car, the separate public facts of any given daily round -- the sequence and full set of which perhaps only you know -- are assembled as a unit of information. And, if the GPS is there for a month, both the overall, boring, day-in-day-out pattern and the regular exceptions and the truly unique exceptions are all a part of the information bundle available "out there."<br /><br /> Even if all of the component information is about mundane, innocent, non-embarrassing activities, indeed has all the properties that would exclude it from your understanding of "private" information, does your willingness to do these things in public view aggregate to willingness for information about them to be aggregated into a tracking record?<br /><br /><b>See also</b><br /><a href="http://caselaw.findlaw.com/us-7th-circuit/1046181.html">UNITED STATES v. GARCIA No. 06-2741</a>.<br />New York Times. Articles on <a href="http://topics.nytimes.com/topics/reference/timestopics/subjects/s/surveillance_of_citizens_by_government/index.html">Surveillance of Citizens by Government</a><br />New York Times. Articles on <a href="http://topics.nytimes.com/top/reference/timestopics/subjects/g/global_positioning_system/index.html">Global Positioning System</a>Anonymoushttp://www.blogger.com/profile/15511432864734182961noreply@blogger.com0tag:blogger.com,1999:blog-3654241774260137070.post-63207004832998465482011-09-10T11:27:00.000-07:002012-11-16T18:36:11.918-08:00From Musical Consonance to Styles of ThoughtAn article published in <i><a href="http://prl.aps.org/abstract/PRL/v107/i10/e108103">Physical Review Letters</a></i>, reported on in <i><a href="http://news.sciencemag.org/sciencenow/2011/09/how-the-ear-distinguishes-sweet-.html?ref=em&elq=41996ae9844041d79845fa5d75788668">Science News</a></i>, describes a mathematical model of how neurons can distinguish <a href="http://en.wikipedia.org/wiki/Consonance_and_dissonance">consonant</a> sounds (say, a C-major chord) from dissonant ones (say, D-E-F). A simple <a href="http://en.wikipedia.org/wiki/Neural_network">network </a>of <a href="http://en.wikipedia.org/wiki/Neuron">neurons</a>, behaving like neurons behave, produces qualitatively different outputs depending on the quantitative differences in the sound frequencies it receives as inputs.<br /><br />Very interesting as an example of an information processing system with emergent information processing capacities.<br /><br />I suspect something, at least metaphorically, similar might go on in the processing/experience of consonant ideas. At first I'm tempted to say "least that part of consonant or resonant ideas that we want to ascribe to consonance in the external world" but I think you could take it further and imagine the development of structures along similar lines for the detection of "constructed" consonance. Eventually, one could arrive at mechanisms for implementing "styles of thought" that would not be limited to algorithmic systems that "crank through a set of data" in the same way every time. Rather, we could talk about styles of thought in terms of the kinds of thoughts, tropes, logics, metaphors that would appeal as consonant with "everything else I believe." Or, the flip side of this would be to move toward mechanisms for <a href="http://en.wikipedia.org/wiki/Cognitive_dissonance">cognitive dissonance</a>.<br /><br /> Just a highly speculative bit of musing, but clearly news of this research did strike a chord with some stuff I've been thinking about for a long time.Anonymoushttp://www.blogger.com/profile/15511432864734182961noreply@blogger.com0tag:blogger.com,1999:blog-3654241774260137070.post-67262652494017509232011-09-04T14:44:00.000-07:002012-11-16T18:36:11.990-08:00Sociology of Information in the New York Times<span class="Apple-style-span" style="background-color: white; font-family: Georgia, serif; font-size: 14px;"></span><br /><div class="bylineRegion" id="section" style="color: grey; font-family: Arial, Helvetica, sans-serif; font-size: 11px; padding-bottom: 2px; text-transform: uppercase;">BUSINESS DAY</div><div class="nyt_headline" id="nyt_headline" style="color: #333333; font-size: 15px; font-weight: bold; padding-bottom: 3px;"><a href="http://www.nytimes.com/2011/09/04/business/economy/on-wall-st-a-keynesian-beauty-contest.html">The Beauty Contest That’s Shaking Wall St.</a></div><div class="byline" id="byline" style="color: #999999; font-family: Arial, Helvetica, sans-serif; font-size: 11px;">By ROBERT J. SHILLER</div><div class="timestamp" id="pubdate" style="color: grey; font-family: Arial, Helvetica, sans-serif; font-size: 11px;">Published: September 3, 2011</div><div class="story" id="summary" style="clear: left; padding-bottom: 30px; padding-left: 0px; padding-right: 0px; padding-top: 2px;"><div style="color: #333333; line-height: 15px;">Why all the sharp swings in the stock market? To Robert J. Shiller, it’s a case of investors trying to guess what other investors are thinking....</div><blockquote style="color: #333333; line-height: 15px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;">Seeking not what is the case, but what others probably think is, or even what others think that others think is...</span></blockquote><div class="bylineRegion" id="section" style="color: grey; font-family: Arial, Helvetica, sans-serif; font-size: 11px; line-height: 15px; padding-bottom: 2px; text-transform: uppercase;">U.S.</div><div class="nyt_headline" id="nyt_headline" style="color: #333333; font-size: 15px; font-weight: bold; line-height: 15px; padding-bottom: 3px;"><a href="http://www.nytimes.com/2011/09/03/us/politics/03perry.html">Perry’s Blunt Views in Books Get New Scrutiny as He Joins Race</a></div><div class="byline" id="byline" style="color: #999999; font-family: Arial, Helvetica, sans-serif; font-size: 11px; line-height: 15px;">By <a class="meta-per" href="http://topics.nytimes.com/top/reference/timestopics/people/s/michael_d_shear/index.html?inline=nyt-per" rel="author" style="color: #004276; text-decoration: none;" title="More Articles by Michael D. Shear">MICHAEL D. SHEAR</a></div><div class="timestamp" id="pubdate" style="color: grey; font-family: Arial, Helvetica, sans-serif; font-size: 11px; line-height: 15px;">Published: September 2, 2011</div><div class="story" id="summary" style="clear: left; padding-bottom: 30px; padding-left: 0px; padding-right: 0px; padding-top: 2px;"><div style="color: #333333; line-height: 15px;">When Rick Perry, the governor of Texas and a presidential hopeful, debates his rivals, his assertions on climate change, Social Security and health care could put him to the test....</div><blockquote style="color: #333333; line-height: 15px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;">Once it's out there, it's out there...</span></blockquote><div class="bylineRegion" id="section" style="color: grey; font-family: Arial, Helvetica, sans-serif; font-size: 11px; line-height: 15px; padding-bottom: 2px; text-transform: uppercase;"><span class="Apple-style-span" style="color: black; font-family: Georgia, serif; line-height: normal;">U.S.</span></div><div style="color: #333333; line-height: 15px;"><span class="Apple-style-span" style="color: black; font-family: Georgia, serif; line-height: normal;"></span></div><div class="nyt_headline" id="nyt_headline" style="color: #333333; font-size: 15px; font-weight: bold; line-height: 15px; padding-bottom: 3px;"><span class="Apple-style-span" style="color: black; font-family: Georgia, serif; line-height: normal;"><a href="http://www.nytimes.com/2011/08/30/us/30wikileaks.html">WikiLeaks Leaves Names of Diplomatic Sources in Cables</a></span></div><div style="color: #333333; line-height: 15px;"><span class="Apple-style-span" style="color: black; font-family: Georgia, serif; line-height: normal;"></span></div><div class="byline" id="byline" style="color: #999999; font-family: Arial, Helvetica, sans-serif; font-size: 11px; line-height: 15px;"><span class="Apple-style-span" style="color: black; font-family: Georgia, serif; line-height: normal;">By <a class="meta-per" href="http://topics.nytimes.com/top/reference/timestopics/people/s/scott_shane/index.html?inline=nyt-per" rel="author" style="color: #004276; text-decoration: none;" title="More Articles by Scott Shane">SCOTT SHANE</a></span></div><div style="color: #333333; line-height: 15px;"><span class="Apple-style-span" style="color: black; font-family: Georgia, serif; line-height: normal;"></span></div><div class="timestamp" id="pubdate" style="color: grey; font-family: Arial, Helvetica, sans-serif; font-size: 11px; line-height: 15px;"><span class="Apple-style-span" style="color: black; font-family: Georgia, serif; line-height: normal;">Published: August 29, 2011</span></div><div style="color: #333333; line-height: 15px;"><span class="Apple-style-span" style="color: black; font-family: Georgia, serif; line-height: normal;"></span></div><div class="story" id="summary" style="clear: left; padding-bottom: 30px; padding-left: 0px; padding-right: 0px; padding-top: 2px;"><div style="color: #333333; line-height: 15px;"><span class="Apple-style-span" style="color: black; font-family: Georgia, serif; line-height: normal;">The antisecrecy organization WikiLeaks published nearly 134,000 diplomatic cables, including many that name confidential sources....</span></div><blockquote><span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;">Developing story -- a leak, a revelation, or just a mistake? (See also <a href="http://soc-of-info.blogspot.com/search?q=wikileaks">previous posts on Wikileaks</a>.)</span></blockquote></div><span class="Apple-style-span" style="color: black; font-family: Georgia, serif; line-height: normal;"></span><br /><div style="color: #333333; line-height: 15px;"></div></div></div>Anonymoushttp://www.blogger.com/profile/15511432864734182961noreply@blogger.com0tag:blogger.com,1999:blog-3654241774260137070.post-45380442418271744162011-09-04T12:25:00.000-07:002012-11-16T18:36:12.063-08:00Bloomberg Contra Notification NormsConsider a recent NYT <a href="http://www.nytimes.com/2011/09/05/nyregion/bloomberg-wont-apologize-for-concealing-arrest-of-deputy-mayor.html">article by Mosi Secret and Michael Barbaro</a> about the controversy over New York mayor Michael Bloomberg's failure to inform the public about the actual reason -- an arrest in Washington, D.C. for domestic violence* -- deputy mayor Stephen Goldsmith resigned this summer.<br /><br /> According to the article, Bloomberg "rejected the notion that he had an obligation to tell the public of the arrest." He is quote saying, “I always assumed it would come out, but it’s not my responsibility.”<br /><br /> It's a first rate example of <a href="http://djjr-courses.wikidot.com/local--files/djjr-cv:research/ryan-notification-norms.pdf">notification</a> in the public sphere and of how overlapping relational circles can suggest contradictory notification rules.<br /><br /> It turns out that it's not just a notification issue, though. Initially the mayor said the resignation was to pursue other opportunities -- in other words, he was pretty explicitly misleading not just failing to reveal.<br /><br /> But back to notification. Bloomberg, apparently, takes the line is that his first obligation was instrumental, making sure "he no longer works for the city." And then his next obligation is to treat Goldsmith and his family with respect. His critics suggest that his first obligation is to the public, although the one quoted in the article, Scott M. Stringer, the Manhattan borough president, sticks with the instrumental saying Bloomberg has responsibility to "protect the public, not to protect a staff member” according to the article. But nobody really seems to be saying that there was any instrumental damage done by the non-notification and it's a bit disingenuous to say that getting Goldsmith off the city payroll was facilitated by non-notification.<br /><br /> The issue, then, is how the various relational imperatives governing who ought to tell whom what when and how interact. New York City law, as it happens, has something to say: "the city’s Department of Investigation must be notified" if an official is arrested in the city (not clear by whom), but this did not come into play here since arrest was in DC. The article reports a debate within the mayor's team about the matter with the mayor saying that Goldsmith should get to decide how much to reveal. And after the fact Goldsmith, who took some heat for not indicating in his resignation announcement what the reason was, has "admitted" that HE had a responsibility to be more forthcoming at the time, though he added that he thought that immediacy of his resignation "mooted the need for further explanation."<br /><br />So, does the mayor's official role and its informational obligations trump the social obligation to allow another "ownership" of his own announcement? Does the consequential outcome -- resignation -- obviate the obligation to notify (for the record, Goldsmith says he was wrong on that count). If there is public outrage based only/mainly on the relational expectation of "we should have been told," does it support sanctions? Does Bloomberg's citation of a norm that certain personal situations are one's own to disclose get him off the hook? Does affirmatively suggesting other reasons rather than simply failing to disclose the actual ones cross another line entirely?<br /><br /> Bottom line: in many locations within the social, institutional, moral orders, the import of information behaviors goes far beyond the instrumental, consequential, substantive realm.<br /><br /> * The case is not being pursued as Mr. Goldsmith's wife dropped the complaint. Anonymoushttp://www.blogger.com/profile/15511432864734182961noreply@blogger.com0tag:blogger.com,1999:blog-3654241774260137070.post-56324470288246275522011-08-13T12:47:00.000-07:002012-11-16T18:36:12.135-08:00Information Control and Politics: Not Just "Over There"<span class="Apple-style-span" style="color: #333333; font-family: arial, sans-serif; font-size: 16px;"></span><br /><div class="storytitle" style="margin-bottom: 20px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><h1 style="font-family: georgia, sans-serif; font-size: 1.4em; line-height: 1.2em; margin-bottom: 0.1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><a href="http://www.npr.org/2011/08/13/139594509/cell-reception-cut-in-san-francisco-to-hinder-protest">Cell Reception Cut In San Francisco To Hinder Protest</a></h1></div><span class="Apple-style-span" style="color: #333333; font-family: arial, sans-serif; font-size: 16px;"><div class="storytitle" style="margin-bottom: 20px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><div class="storylocation" id="storybyline"><div class="bucketwrap byline" id="res19761027"><div class="byline" style="color: black; font-size: 0.7em; line-height: 1.45em; margin-bottom: 0.6em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">by <span style="text-transform: uppercase;">THE ASSOCIATED PRESS</span></div></div></div></div><div class="storylocation" id="storytext" style="clear: both; height: 584px; margin-bottom: 18px; overflow-x: hidden; overflow-y: hidden;"><div class="dateblock" style="margin-bottom: 10px; overflow-x: hidden; overflow-y: hidden;"><span class="date" style="color: #999999; font-size: 0.85em; font-style: italic;">August 13, 2011</span></div><div style="font-size: 0.85em; line-height: 1.45em; margin-bottom: 1.25em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">Transit officials blocked cellphone reception in San Francisco train stations for three hours to disrupt planned demonstrations over a police shooting.</div><div style="font-size: 0.85em; line-height: 1.45em; margin-bottom: 1.25em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">Officials with the Bay Area Rapid Transit system, better known as BART, said Friday that they turned off electricity to cellular towers in four stations from 4 p.m. to 7 p.m. Thursday. The move was made after BART learned that protesters planned to use mobile devices to coordinate a demonstration on train platforms. ... <<a href="http://www.npr.org/2011/08/13/139594509/cell-reception-cut-in-san-francisco-to-hinder-protest">MORE</a>></div></div></span>Anonymoushttp://www.blogger.com/profile/15511432864734182961noreply@blogger.com0tag:blogger.com,1999:blog-3654241774260137070.post-46021591751787702922011-07-21T15:38:00.000-07:002012-11-16T18:36:12.207-08:00This is your Background Check on SteroidsAn article, "<a href="http://www.nytimes.com/2011/07/21/technology/social-media-history-becomes-a-new-job-hurdle.html">Social Media History Becomes a New Job Hurdle</a>," by <a href="http://topics.nytimes.com/top/reference/timestopics/people/p/jennifer_preston/index.html?inline=nyt-per">Jennifer Preston</a> in yesterday's NYT is obvious fodder for the sociology of information. It's primarily about <a href="http://www.socialintelligencehr.com/home" title="The company Web site. ">Social Intelligence</a>, a web start up that puts together dossiers about potential employees for its clients by "<a href="http://en.wikipedia.org/wiki/Web_scraping">scraping</a>" the internet.<br /><br />Issues that show up here:<br /><ul><li>the federal government (<a href="http://www.ftc.gov/">FTC</a>) was looking into whether the company's practices might violate the <a href="http://en.wikipedia.org/wiki/Fair_Credit_Reporting_Act">fair credit reporting act</a> (<a href="http://www.ftc.gov/os/statutes/031224fcra.pdf">FCRA</a>), but <a href="http://www.ftc.gov/os/closings/110509socialintelligenceletter.pdf">determined it was in compliance</a></li><li>"privacy advocates" said to be concerned that it might encourage employers to consider information not relevant to job performance (why not fair employment advocates? -- later in the article we do find mention of <a href="http://www.eeoc.gov/">Equal Employment Opportunity Commission</a>)</li><li>what do we make of the statement: "Things that you can’t ask in an interview are the same things you can’t research"?</li><li>since this is really just an extension of the idea of the "background check" -- can we think a little more systematically about that as a general idea prior to getting mired in details of internet presence searches? </li></ul>Perhaps more alarming than the mere question of information surfacing was the suggestion by the company's founder, Max Drucker, about how a given bit of scraped information might be interpreted. To wit, he mentioned fact that a person had joined a particular <a href="https://www.facebook.com/pages/This-is-America-I-shouldnt-have-to-press-1-for-English/329270141732">Facebook group</a> might "mean you don’t like people who don’t speak English." According the reporter he posed this question rhetorically: "Does that mean...?" This little bit of indirect marketing via fear mongering adds another layer to what we need to look at: what sort of information processing (including interpretation and assessment) are necessary in a world where larger and larger amounts of information are available (cf. CIA problem of turning acquired information into intelligence via analysis).<br /><br />Drucker characterized the company's goal as "to conduct pre-employment screenings that would help companies meet their obligation to conduct fair and consistent hiring practices while protecting the privacy of job candidates." This raises another interesting question: if an agent has a mandated responsibility for some level of due diligence and information is, technically, available, will a company necessarily sprout up to collect and provide this information? Where would feasibility, cost, and the uncertainty of interpretation enter the equation? Can the employer, for example, err on the side of caution and exclude the individual who joined the Facebook group because that fact MIGHT mean something that the employer could be liable for not having discovered? Will another company emerge that helps to assess the likelihood of false positives or false negatives? What about if it is only a matter of what the company wants in terms of its corporate culture? Can we calculate the cost (perhaps in terms of loss of human capital, recruitment costs, etc.) of such technically assisted vigilance?Anonymoushttp://www.blogger.com/profile/15511432864734182961noreply@blogger.com0tag:blogger.com,1999:blog-3654241774260137070.post-38311885114977974202011-06-21T11:37:00.000-07:002012-11-16T18:36:12.279-08:00Anonymity and the Demise of the EphemeralThe New York Times email update had the right headline "<a href="http://www.nytimes.com/2011/06/21/us/21anonymity.html">Upending Anonymity, These Days the Web Unmasks Everyone</a>" but made a common mistake in the blurb: "Pervasive social media services, cheap cellphone cameras, free photo and video Web hosts have made privacy all but a thing of the past."<br /><br />It's going to be important in our policy conversations in coming months and years to get a handle on the difference between privacy and anonymity (and others such as confidentiality) and how we think about rights to, and expectations of, each. <br /><br />There's a long continuum of social information generation/acquisition/transmission along which these various phenomena can be located:<br /><ul><li>artifactual "evidence" can suggest that someone did something (an outburst on a bus, a car broken into, a work of art created)</li><li>meta-evidence provides identity trace information about the person who did something (a fingerprint, a CCTV picture, DNA, an IP address, brush strokes)</li><li>trace evidence can be tied to an identity (fingerprints on file, for example)</li><li>data links can suggest other information about a person so identified</li></ul>Technology is making each of these easier, faster, cheaper and more plentiful. From the point of view of the question, whodunnit?, we seem to be getting collectively more intelligent: we can zero in on the authorship of action more than ever before. But that really hasn't much to do with "privacy," per se.<br /><br />As <a href="http://www.mediapost.com/publications/?fa=Articles.showArticle&art_aid=152118">Dave Morgan</a> suggests <a href="http://www.mediapost.com/publications/?fa=Articles.showArticle&art_aid=152118">in OnlineSpin</a> (his hook was <a href="http://www.google.com/search?q=facebook+facial+recognition">Facebook's facial recognition technology</a> that allows faces in new photos to be automatically tagged based on previously tagged photos a user has posted) the capacity to connect the dots is a bit like recognizing a famous person on the street, and this, he notes, has nothing to do with privacy.<br /><br />What it does point to is that an informational characteristic of public space is shifting. One piece of this is the loss of ephemerality, a sharp increase in the half-life of tangible traces. Another is, for want of a better term on this very hot morning in Palo Alto, "linkability"; once one piece of information is linked to another, it can easily be linked again. And this compounds the loss of ephemerality that arises from physical recording alone.<br /><br />From the point of view of the question asked above, the change can mean "no place to hide," but from the point of view of the answer, it might mean that the path to publicity is well-paved and short.<br /><br />Some celebrate on both counts as a sort of modernist "the truth will out" or post-modernist Warholesque triumph. But as pleased as we might be at the capacity of the net to ferret out the real story (the recent unmasking of "<a href="http://www.google.com/search?q=Gay+Girl+in+Damascus">Gay Girl in Damascus</a>" yet another example), the same structure can have the opposite effect. The web also has immense capacity for the proliferation and petrification of falsehood (see, for example, <a href="http://www.oup.com/us/catalog/general/subject/Sociology/PopularCulture/?view=usa&ci=9780199736317">Fine and Ellis 2010</a> or <a href="http://www.newyorker.com/arts/critics/books/2009/11/02/091102crbo_books_kolbert">Sunstein 2009</a>).<br /><br />Thus, it may well be that the jury is still out on the net effect on the information order.<br /><br />See also :<a href="http://soc-of-info.blogspot.com/2011/04/no-such-thing-as-evanescent-data.html">"No Such Thing as Evanescent Data"</a>Anonymoushttp://www.blogger.com/profile/15511432864734182961noreply@blogger.com0tag:blogger.com,1999:blog-3654241774260137070.post-11453612121609773592011-06-08T18:27:00.000-07:002012-11-16T18:36:12.351-08:00animal diminutivesAt the risk of straying too far off the sociology of information trail, may I report a conversation from this morning's ride down to <a href="http://casbs.org">CASBS </a>and request your assistance?<br /><br />My ride partner mentioned a conversation with a "<a href="http://cubreporters.org/jobs.html">cub reporter</a>" the other day. Why, we wondered, is <i>Ursus</i> the right genus for journalists? And what animal diminutives do we use for other professions?<br /><br />If <a href="http://www.kidzone.ws/sharks/facts7.htm">baby sharks are called pups</a>, should new law firm associates be called pups? And those just getting started out in the human smuggling business? How about beginner loan sharks? Or sleazy wheeler dealers at the start of their career: snakelets? Hatchlings?<br /><br />If an editor has an eagle eye, is an editorial trainee a eaglet? Do others come to mind?<br /><br />And back to the journalists: why are they bears? OED gives first occurrence as 1899 J. L. Williams in <a href="http://en.wikipedia.org/wiki/Scribner%27s_Magazine">Scribner's Mag</a>.25 277 "The cub reporter and the king of Spain." and lists two other "cubs": engineer and (river boat) pilot (both from M. Twain. And one of the definitions of "cub" is "An undeveloped, uncouth, unpolished youth" with the explanation that it comes from the idea that "the young of the bear was fabled to be born in a shapeless condition, and afterwards licked into shape by the mother" and the earliest usage is Shakespeare in "Twelfth Night" (1623).<br /><br />So, let me put the question out there -- do you know of any other animal diminutives that we apply to beginners in various professions or trades?Anonymoushttp://www.blogger.com/profile/15511432864734182961noreply@blogger.com0tag:blogger.com,1999:blog-3654241774260137070.post-10791488606877893252011-05-10T11:45:00.000-07:002012-11-16T18:36:12.423-08:00Adding Sociology of Information Blogs to the Blog RollUp to now our sidebar included the names of blogs that linked to The Sociology of Information. Now that the field has started to achieve something of a latent critical mass out there, I'm evolving the blog roll in the direction of "other blogs on the topic" which is really more useful.<br /><br />First entry is Drew Conway's <a href="http://www.drewconway.com/zia/">Zero Intelligent Agents</a> blog. Drew is a PhD student in political science at <a href="http://politics.as.nyu.edu/page/phd">New York University</a> who studies terrorism and armed conflict using tools from mathematics and computer science. Much of the material on the blog is more on the techie side of things (it's an extremely useful resource in this regard) but interspersed with news about python routines and R utilities is much grist for the sociologist of information's mill.Anonymoushttp://www.blogger.com/profile/15511432864734182961noreply@blogger.com0tag:blogger.com,1999:blog-3654241774260137070.post-44856601005712660252011-05-03T14:18:00.000-07:002012-11-16T18:36:12.495-08:00Toward a Wikipedia of SociologyEvery few years one gets a request from the editor of an encyclopedia of social theory or globalization or social research. Some publisher has succumbed to the idea that a new compendium is needed and some senior scholar has succumbed to the idea that "the time has come...." Or, some senior scholar has managed to cajole some junior scholar into doing most of the work on a project that will bear the senior scholar's name. OK, that last might be a little harsh. What's next is someone conjures up a list of usual suspects (or, more likely, a series of database searches produces such a list). Then someone sets up a content management system and an editor at the publisher solicits articles on behalf of the senior scholar editor -- usually with promise of a complimentary copy of the finished volume(s) as an honorarium<br /><br />I wonder, though, if the days of this genre are numbered. Would it not make sense to create an encyclopedia of sociology for and by card-carrying sociologists? Mightn't crowd-sourcing disciplinary knowledge be superior to the limited intellectual resources represented by centrally selected article authors and the limited review of a small handful of editors? I mean, the typical encyclopedia article probably has fewer peer reviews than most articles get. <br /><br />What if a professional association opened up a wiki with a single restriction: you have to be a member to edit and you have to edit under your own identity. Beyond that, no central control.<br /><br />To be realistic, this is probably much more openness and flexibility than most professional associations could ever tolerate. There'd have to be a committee of members and probably a report to the executive committee or something like that that would turn the endeavor into as close a clone of the traditional encyclopedia as possible.<br /><br />So, maybe what has to happen is that the project has to start with a small group of renegades. And so, just by way of testing the waters, that's what I am proposing.<br /><br />You sociologists out there, are you game?Anonymoushttp://www.blogger.com/profile/15511432864734182961noreply@blogger.com0tag:blogger.com,1999:blog-3654241774260137070.post-69289431127010552852011-04-26T17:44:00.000-07:002012-11-16T18:36:12.567-08:00Reinventing Research? Information Practices in the Humanities[re-blogged from <a href="http://resourceconnection.blogspot.com/">Resource Connection : April 26, 2011</a>]<br /><br />A project of the <a href="http://www.rin.ac.uk/">Research Information Network (RIN)</a> focuses on the behaviours and needs of researchers working in the humanities.The goal of <span class="caps">RIN</span> study is to:<br /><ul><li>"develop an in-depth understanding of humanities researchers’ approaches to discovering, accessing, analysing, managing, creating, refining and disseminating information resources;</li><li>"provide comparisons between the behaviours and needs of researchers in different subjects/disciplines, research teams or institutional contexts;</li><li>"identify barriers to more effective performance in using, creating, managing and exchanging information resources, and suggest how they might be overcome."</li></ul><br />The report is based on interviews and focus groups with academics responsible for digital humanities projects such as <a href="http://www.oldbaileyonline.org/">Old Bailey Online</a>, <a href="http://www.diamm.ac.uk/index.html">Digital Image Archive of Medieval Music</a>, and <a href="https://republicofletters.stanford.edu/">The Digital Republic of Letters</a>, projects they've arrayed in a two dimensional attribute space defined by computational complexity and collaborative complexity:<a href="http://www.rin.ac.uk/system/files/attachments/Humanities_Case_Studies_for_screen.pdf" title="Humanities_Case_Studies_for_screen.pdf" type="application/pdf; length=1452243"></a><br /><br /><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgUCC5Brzp6NYEAB8Q8U8q8lD6ZxFRclzB3tKzUHwXZT-CwUH5-J60xORk_y1a5fEKr3G1p3QkfaV0XWYkwEi2PHtH8KYwbjVgBr_TlQTpCZ7CMC4FnreGdO53SuNK28LL9hyphenhyphenAouPyTV-_n/s1600/image001.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="358" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgUCC5Brzp6NYEAB8Q8U8q8lD6ZxFRclzB3tKzUHwXZT-CwUH5-J60xORk_y1a5fEKr3G1p3QkfaV0XWYkwEi2PHtH8KYwbjVgBr_TlQTpCZ7CMC4FnreGdO53SuNK28LL9hyphenhyphenAouPyTV-_n/s400/image001.jpg" width="400" /></a></div> The report is available to download from<a href="http://www.rin.ac.uk/system/files/attachments/Humanities_Case_Studies_for_screen.pdf" title="Humanities_Case_Studies_for_screen.pdf" type="application/pdf; length=1452243"> Information use: case studies in the humanities - Report</a><br /><div class="field field-type-filefield field-field-attachments"><div class="field-field-attachments-content"> </div></div>Anonymoushttp://www.blogger.com/profile/15511432864734182961noreply@blogger.com0tag:blogger.com,1999:blog-3654241774260137070.post-62661214900384851272011-04-22T15:16:00.000-07:002012-11-16T18:36:12.639-08:00No Such Thing as Evanescent DataPretty good coverage of the "iphone keeps track of where you've been" story in today's NYT "<a href="http://www.nytimes.com/2011/04/22/technology/22data.html">Inquiries Grow Over Apple’s Data Collection Practices</a>" and in David Pogue's column yesterday ("<a href="http://pogue.blogs.nytimes.com/2011/04/21/your-iphone-is-tracking-you-so-what/?ref=technology">Your iPhone Is Tracking You. So What?</a>"). Not surprisingly, devices that have GPS capability (or even just cell tower triangulation capability) write the information down. Given how cheap and plentiful memory is, not surprising that they do so in ink.<br /><br />This raises a generic issue: <a href="http://en.wikipedia.org/wiki/Evanescent">evanescent</a> data (information that is detected, perhaps "acted" upon, and then discarded) will become increasingly rare. We should not be surprised that our machines rarely allow information to evaporate and it is important to note that this is not the same as saying that any particular big brother (or sister) is watching. Like their human counterparts, a machine that can "pay attention" is likely to remember -- if my iPhone always know where it is, why wouldn't it remember where it's been? <br /><br />It's the opposite of provenience that matters -- not where the information came from but where it might go to. Behavior always leaves traces -- what varies is the degree to which the trace can be tied to its "author" and how easy or difficult it is to collect the traces and observe or extract patterns they may contain. These reports suggest that the data has always been there, but was relatively difficult to access. It's only recently that, ironically, due to the work of the computer scientists who "outed" Apple, that there is an easy way to get at the information.<br /><br />Setting aside the issue of nefarious intentions, we are reminded of the time-space work of the human geographers such as <a href="http://en.wikipedia.org/wiki/Nigel_Thrift">Nigel Thrift</a> and Tommy Carlstein who did small scale studies of the space-time movements of people in local communities in the 1980s and since. And, too, we are reminded of the 2008 controversy stirred up when <a href="http://www.nature.com/news/2008/080604/full/news.2008.874.html">some scientists studying social networks</a> used anonymized cell phone data on 100,000 users in an unnamed country.<br /><div class="separator" style="clear: both; text-align: center;"><a href="http://www.agocg.ac.uk/reports/visual/casestud/southall/fig3.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="257" src="http://www.agocg.ac.uk/reports/visual/casestud/southall/fig3.gif" width="320" /></a></div><div style="text-align: center;"><a href="http://www.agocg.ac.uk/reports/visual/casestud/southall/visual.htm"><span style="font-size: xx-small;">http://www.agocg.ac.uk/reports/visual/casestud/southall/visual.htm</span></a></div><br />Of course, the tracking of one's device is not the same as the tracking of oneself. We can imagine iPhones that travel the world like that <a href="http://en.wikipedia.org/wiki/Travelling_gnome_prank">garden gnome in Amelie</a> and people being proud not just of their own travels but where there phone has been. <br /><br /><b>See also</b><br /><ol><li><span style="font-size: small;"><a href="http://soc-of-info.blogspot.com/2010/02/technologically-induced-social.html">Technologically Induced Social Alzheimers</a></span> </li><li><span style="font-size: small;"><a href="http://soc-of-info.blogspot.com/2009/03/courts-and-public-information-order.html">Information Rot</a></span><br /></li></ol>Anonymoushttp://www.blogger.com/profile/15511432864734182961noreply@blogger.com0