Speaking at Mobile Convention Brussels – 27 Nov

I’ll be speaking during the Mobile Convention Brussels on the 27th of November about the growing importance of mobile privacy and security issues, alongside representatives from Google, Warner Bros, Uber, RTL, and many more.

The conference organizers interviewed me to promote the event, and you can find that here.

It should be a great event for anyone interested in exploring and understanding the future of the mobile landscape. I hope to see you there!

Screen Shot 2014-11-19 at 3.07.11 AM

Virtual Reality – Recommended Reading

Here’s a first stab at what I would consider good starting reading on virtual reality – both to get a sense of the topic from researchers and VR developers, as well as some defining visions of what virtual reality might become:

Fiction

Neuromancer, by William Gibson (1984) – A truly visionary work of science fiction that gave us the first fully realized imagining of cyberspace, and deeply influenced a generation of science fiction writers and researchers alike. Jeremy Bailenson, founding director of Stanford University’s Virtual Human Interaction Lab says Neuromancer, “was without a doubt what inspired me to become a scholar of avatars… Large government grants have been awarded to me for building and testing Gibson’s ideas. Academic papers are improved by Gibson quotes that sum up the big ideas of the research. PhD students walk out of my office with a copy when searching for dissertation topics. Undergraduates who can’t imagine the world without the ‘cyberspace’ that Gibson predicted (or perhaps facilitated) grumble about my using it as a textbook in my lecture classes… Without Neuromancer, the world of virtual reality as a whole would look very different.”

Snow Crash, by Neil Stephenson (1992) – This was my first exposure to the cyberpunk genre, as an assigned reading in a 1995 undergraduate elective class on technology and society. Michael Abrash, formerly of Id Software and Valve fame, and now Chief Scientist at Oculus, describes the influence of Snow Crash this way, “It all started with Snow Crash. If I hadn’t read it and fallen in love with the idea of the Metaverse, if it hadn’t made me realize how close networked 3D was to being a reality, if I hadn’t thought I can do that, and more importantly I want to do that, I’d never have embarked on the path that eventually wound up at Valve.”

Ready Player One, by Ernest Cline (2012) – Another hugely entertaining, imaginative vision of virtual reality, and influential for the latest generation of developers. Palmer Luckey recommends this to everyone at Oculus, and Ernest Cline is similarly a fan of the Rift. As he remarked on the difficulty of timing in science fiction writing after being invited to Oculus, “You’re often wrong when you try to predict the advancements of technology and in this case, I feel like I underestimated instead of overestimated, which is really exciting.”

Nonfiction

Interview with Jaron Lanier on Virtual Reality, Whole Earth Review (1989) – An early interview with the so-called godfather of virtual reality, Jaron Lanier. Aside from being a great window into the astonishing range of thoughts Lanier has always had about the potential of VR, here he puts forward the argument that the real potential of VR is social: “Other people are the life of the party in Virtual Reality. Other people are the unique things that will animate Virtual Reality and make it astonishingly unpredictable and amazing.”

Infinite Reality: The Hidden Blueprint of our Virtual Lives, by Jim Blascovich and Jeremy Bailenson (2011) – A fascinating tour of VR research by two top researchers in the field. This book focuses on how the human mind behaves in virtual environments, and the social and psychological issues that will become hot topics as VR becomes a mass market technology.

The Body Has a Mind of Its Own: how body maps in your brain help you do (almost) everything better, by Sandra Blakeslee and Matthew Blakeslee – recommended to me by virtual reality researcher (and new Oculus employee) Will Steptoe, this book delves into the emerging science of “body maps” – how your sense of self extends into the space around you and the objects you hold. Though not specifically focused on VR (though there is a special chapter on VR and body maps) the topic as a whole will be central to how effectively VR becomes an ‘embodied’ form of both computing and cognition.

What would you add to the list? Comment below, and I’ll include any good suggestions in future iterations.

Journal article: Teaching International Relations with New Media

I’ve just published an article on teaching International Relations with new media in the German journal of IR, Zeitschrift für Internationale Beziehungen.

The full text can be found here: ZiB 1/2014 – Teaching IR with New Media

My conclusion:

Our students will likely spend their lives increasingly reliant on the Internet, mobile computing and online social networks to navigate the complexities of their world. They will be entering a networked information economy that differs significantly from the industrial information economy that preceded it, and must develop news skills to cope with rapid increases in the volume, variety and velocity of information in society. They will be required to engage with new media spaces in order to make their voices heard in these new public forums, and a premium will be placed on their ability to meaningfully discover, make critical sense of, and contribute to knowledge flows.

As the complexity and speed of global communications continues to increase, digital information literacy will become a more challenging and more important skill set to acquire. Bridging their firsthand experience with the Internet, social networks and mobile devices with rigorous analysis of the social and political impacts of those forces is an exciting opportunity in International Relations teaching. Building this into the design of our classes creates the opportunity for learning and reflection by both teachers and students on many complex, important themes of the digital age.

It is important to help break down the traditional isolation of the university classroom by connecting students more deeply to ongoing academic debates, to their classmates and teachers through collaboration, and to the wider world outside the classroom through these new public spaces. Technology can facilitate the goal of university courses to step beyond their traditional role as centers of expert knowledge transfer, into more dynamic venues for the analysis, critique and collaborative creation of knowledge by students themselves. By taking this step we are more likely to see our students think rather than just learn, and we in turn are more likely to learn from them. In an era of accelerating technological disruption in every area of public life, we all have much to learn.

In the future…

In the future everybody will be world famous for 15 minutes.

- Andy Warhol

 

In the future everyone will be anonymous for 15 minutes.

- Banksy

 

Chomsky: Twitter is not a medium of a serious interchange

In a recent interview, the MIT linguist and critic of mass media Noam Chomsky was asked about social media, and had this to say:

Well, let’s take, say, Twitter. It requires a very brief, concise form of thought and so on that tends toward superficiality and draws people away from real serious communication… It is not a medium of a serious interchange.

Although this conforms with many mainstream views of the shallow nature of digital communication, it perhaps misses the point, considering that Twitter and many other forms of social media often aren’t trying to be a medium of “serious interchange”. By serious exchange, I’m assuming Chomsky means substantive argument, but why should ‘serious communication’ be limited to persuasion?

Among the many uses of language, two important forms are persuasive, and informative. We use the persuasive mode when we try to convince others of the correctness of our views or the necessity for action, while the informative mode is used to exchange information about our world and coordinate action. 140 characters is a terrible length for persuasive arguments – a claim, reason, evidence and acnkowedgement of counterarguments don’t fit well into 140 characters – but it’s an excellent length for exchanging information: “there are rioters burning the bank on High Street”, “floods expected in the north of the city, residents should evacuate.”, or “read this amazing persuasive argument: (link)”

In situations like this, a Tweet might be a better idea than a serious interchange

Where Chomsky goes wrong is in assuming that ‘public’ language is the only significant language. While exchanges like Twitter posts may be displacing some types of communication, in many cases, they can also enable and enhance other forms of serious, though non-public discussion.

Further Reading:

• Nathan Jurgenson, ‘Why Chomsky is Wrong About Twitter – Salon.com

• An interesting recent interview with Chomsky covering everything from the comic potential of bananas to 1940’s baseball statistics to Twitter and transparency in government, can be found here. Incidentally, this post includes some great photographs from around Chomsky’s office at MIT

Concepts to Know: Crowdmapping

What is Crowdmapping?

Screen shot of Libyan Crisis Map from http://libyacrisismap.net/

Crowdmapping is the aggregation of crowd-generated inputs such as text messages and social media feeds with geographic data to provide real-time, interactive information on events such as wars, humanitarian crises, crime, elections, or natural disasters (the results are sometimes referred to as crisis maps). If properly implemented, crowdmapping can bring a level of transparency to fast-moving events that are difficult for traditional media to adequately cover in real-time, or to longer-term trends that may be difficult to identify through the reporting of individual events.

Who can create crowdmaps?

Anyone can create crowdmaps using tools such as Crowdmap.com, which runs on the open source Ushahidi platform.

Ushahidi is a Kenyan technology initiative developed in response to the 2008 post-election violence:

Potential benefits of crowdmapping

Although the benefits depend on effective organization, public awareness and accurate information (no small feat to coordinate all three), the use of interactive, real-time mapping to track fires, floods, crime, political violence, the spread of disease, or instances of government corruption are just a few of the ways crowdmapping promises to enhance knowledge and transparency about a range of public health and safety issues.

For public security organizations such as police forces, crowdmapping could be used to build stronger connections to the communities they serve. If an effective, widely known crowdmap had existed for London during the recent rioting, perhaps more time could have been spent coordinating an effective police response and less time wasted following in the footsteps of Hosni Mubarak by trying to figure out how to shut down Twitter.

The challenges of effective crowdmapping

The deployment of crisis mapping technology is on its way to becoming a standard tool to collect and track ground truth from crisis zones, but very little work has been done to evaluate and mitigate the threat posed by adversaries with offensive infosec capabilities.

- George Chamales

Aside from questions of building effective public awareness, the scope of usage, and the reliability of user information, the flip side of the optimistic public service vision of crowdmapping is that of a repressive regime using the technology to more effectively track and quash dissent, or adversarial groups engaging in disinformation campaigns.

The more that individuals learn how to effectively self-organize using social media tools, the more authoritarian governments or adversarial groups will learn about how to effectively use these same tools for their own ends. Crowdmapping was used in the recent Egyptian revolution, and this blog briefly explores the exchange between Egyptian activists using Ushahidi and the government authorities who tried to disrupt them.

For an interesting exploration of these issues, see veteran crowdmapping organizer George Chamales’ presentation notes and slides on defending crisis maps from the 2011 Black Hat security conference. Although I didn’t have the chance to attend, it sounded like an interesting exploration of just these sorts of issues:

In this session we’ll setup, operate, attack and defend an online crisis map. Bring your laptop and toolsets because you will have the opportunity to play the bad actor (a technical member of the secret police or terrorist organization) as well as the defender (the response agency, citizen on the ground, and sysadmin trying to keep the server online).

The experience will bring together everything we know and love and hate about defending online systems including buggy code, naive users, and security vs. usability tradeoffs and do so in a situation where people are dying and the adversary controls the network. We’ll also introduce some not-so-typical concepts like building trust on the fly, crowdsourced verification, and maintaining situational awareness from halfway around the globe.

See also this piece from the MIT Technology Review on Chamales’ presentation: Why Crisis Maps Can Be Risky When There’s Political Unrest

My introduction to crowdmapping came through researching Kenya’s tech scene, and talking with Ushahidi team members Erik Hersman (Director of Operations & Strategy) and Heather Leson (Director of Community Engagement) at a recent community development meeting at iHub Nairobi. I can tell you from personal experience, they’re an exceptionally talented, energetic and helpful group of people, who are serious about the expanding the reach and utility of their platform. Expect interesting things from them.

What can we learn about Somalis from their Facebook networks?

Facebook network visualization of +1000 friends

After the initial focus on the Somali dominated economy and social structure of Eastleigh, I hoped to contribute additional material to the project by mapping out the online social networks of Somalis (or at least as many as I could convince to grant me access to their network data). I hoped such material would add a quantitative element to the oral reports of geographically distributed social and economic trust networks prevalent among Somalis in Eastleigh, and give us a way to create interesting, simplified visualizations for complex data sets.

I intended to find out whether online social networks serve as relatively close proxies for real social networks, and if so, whether comparative analysis of several ethnic groups might reveal significant differences in the geographic diversity of Somali social networks relative to other groups. The loose hypothesis being that a wider geographical distribution of the social networks of Somalis living in Eastleigh compared to their non-Somali neighbors could perhaps explain some of their relative economic success, due to wider access to information, economic / trade opportunities and sources of funding.

Brief note on methodology:

Facebook network data was collected using Netvizz, with the resulting gdf file fed into Gephi for visualization and analysis. This was done with the subject present after a short briefing of what data would be collected, and a short demonstration of what can be seen with the resulting data. Subjects were selected from a range of socio-economic backgrounds, though demographic diversity was limited to available facebook users, which tended to be in the 18-34 year-old range. Samples were taken from Somali diaspora living abroad in countries like the US and Sweden, Somalis who fled Somali directly for Kenya and settled in Eastleigh, and Kenyan Somalis who were born and raised in Kenya.

No subjects declined access to their network data or refused permission for the data set to be retained, and all were quite interested in the resulting visualizations. Many reported that they were impressed with the visual structure of their network, were surprised by finding unexpected friend-to-friend linkages during the analysis, and most requested a copy of the resulting visualizations, often so they could share them back on Facebook. There seemed to be a certain pride in seeing their friend networks, with comments such as “this is my universe”, or “my galaxy of friends” common.

Collection of online social network data was seen as a way to avoid problems of weak and unreliable data commonly associated with self-reporting of social network connections. Some newer methods of tracing out personal social networks promise significant improvements, but at the moment are quite time, space and material consuming, and relatively impractical for a brief exploratory study such as this one.

Early assessment of the methodological approach

Although the evidence collected thus far has been quite interesting, I have strong doubts about whether such an approach would yield quantitatively significant evidence to support the original hypothesis.

The first problem comes from selection biases. Are the groups that are significant users of social networks here likely to represent a broad enough cross section of the population here in Eastleigh to tell us anything applicable to the broader community – I would tentatively conclude no, for three reasons:

1)    The surprising diversity of the Somali community as a whole.

–       Somalis came to Eastleigh in multiple waves over more than a 100 year period, and effort to define what actually constitutes a diaspora are problematic. Cleanly dividing Somali Somalis from Kenyan Somalis, from Issac Somalis, much less clan divisions such as Darood and Hawiye for example will require much more in-depth research and survey work before the various groups’ economic impact can be examined. Simply put, there is too much diversity within the community to make simplistic assumptions about a ‘Somali diaspora’ whose communal and wider social ties can be meaningfully aggregated into a single comparable group that can be measured relative to another Kenyan ethnic group.

-       There are also deep questions about geographic dispersion that need to be further understood before any generalizations can be made about the community as a whole. Are Somalis living in the United States more or less significant sources of funds and opportunities than Somalis who have a much longer history in Dubai for example? How could we weight the economic impact of those groups, much less for the dozens of other Somali diaspora communities spread across the globe?

2)    The limited sample of the community that are active facebook users

-       While Facebook usage seems to be surprisingly widespread, with only 3% of the total Kenyan population using facebook, would this be a realistic way to make broader assumptions about the community as a whole?

-       Although the demographic profile of FB users in Kenya is perhaps good for understanding youth and young professional networks (62% of Facebook users are between the ages of 18-34), are these mostly the young and urbanized? There are also questions of gender representation. With only 37% of FB users in Kenya being female, how does this compare with rates of female participation in the Eastleigh economy?

3)    The wide diversity of usage behaviors even within the community of active facebook users.

-       The sheer range of facebook network sizes encountered has been surprising. Discovering last year that Somali and Kenyan facebook users tended to have much larger average network sizes than Europeans, I was expecting to find a greater degree of fidelity in those networks in terms of identifiable clusters of context (individual networks sub-groups that represent distinct groups of friend interconnections, often denoting geographic separation)

-       The meaningful identification of network clusters corresponding to real-life social contexts or connections, however, seems to be a combination of network size and behavior associated with link establishment. For example, on the low-end, typical German social networks are often in the range of 50 – 200 friends. From informal surveys of small networks, I would conclude that little meaningful information about larger social structures, past experiences, deeply connected communities, or social behavior can be generated from networks of less than perhaps 200 connections. There hust isn’t enough community density to tell much about real-world social contexts.

A network of 129 friends. Although sizing nodes relative to betweenness centrality revealed significant friends, modularity partitioning reveals little discernable contextual structure.

-       The mid-range of say 300-600 friends seems to generate a good deal of clearly discernable structure, depending on friendship behavior (are the connections those actually known and deemed even somewhat significant in real-life by the user?) These are common, but may be representative of little more than individual idiosyncrasies in friend selection behavior.

Network of 340 friends with clear community clusters and several significant friends identifed by betweenness centrality weighting of node size

-       Networks of 1,000 and above seem to lose the clarity of structure, as dense central clusters and high betweenness centrality (typical measures of context and closeness, respectively in the mid-sized networks) are often unrepresentative of meaningful social ties, rather than highly permissive friend acceptance behaviors.

Facebook network of +1100 friends, with large number of unconnected isolates indicating very weak social ties. Even the densely conntected central cluster were largely unknown persons using pseudonyms, and high betweenness centrality was unconnected with actual closeness of social ties

Another network of +1000 friends. More distinguishable community clusters, but densely interconnected central cluster does not represent a homogenous context, and high betweeenness centrality does not correlate with actual close friendships. Creative use of filtering would be needed here to make meanngful conclusions about the ties within this social network

-       Even significantly larger networks are reportedly common. Just as an illustration of the diversity of social network ‘friending’ behavior, in a focus group run with a cross section of young Somalis, within a sample size of only ten people, diversity ranged from 50 friends, to more than 14,000 friends spread out over 3 personal accounts.

A focus group of 10 relatively homogenous Somalis, yet facebook network sizes of the participants ranged from 50 friends by one user who was only trying to find an old girlfriend, to more than 14,000 friends spread out over three accounts by a Somali journalist who uses facebook to distribute news and collect source information

-       It appears very common to establish facebook connections almost as a casual form of business card exchange – less formal than a phone number exchange, but offering the possibility for social discovery and continued contact. –       Multiple accounts specifically tailored for individual audiences are common. For Somali girls especially, one account may be created with a family audience in mind, and another for purely ‘social’ use. This would be a venue where forms of interaction that might be unacceptable to the family (photo sharing, humorous wall posts and exchanges, flirting, etc) would take place. One informant reported that it’s common for some young Somali girls to create many more accounts, “One for a boyfriend, one for girlfriends, one for the family, one for a cousin who’s a notorious snitch, and so on.”

A small network of 90 friends, constructed by a young Somali woman for family use

 

Recommendations for further research:

This diversity which makes many generalizations impossible, also reveals quite a lot about the identities of Somalis negotiating lives within multiple cultures, and yields rich ethnographic and sociological material on their views about subjects such as appropriate forms of socialization in the digital world, the use of digital information flows, and perceptions of online security.

Although these are all topics that warrant separate discussion, one interesting anecdotal insight to emerge is the nearly inverse perceptions of physical vs. cyber security threats to what is commonly encountered in Germany. In Germany, the physical world is often viewed as relatively low-risk environment, and the digital world full of dangers (threats to privacy, fraud, hacking, identity theft, reputational dangers, potential for the misuse of personal data, etc.), while nearly the opposite is true in Eastleigh. Here the physical world presents a host of dangers to guard against, while the digital world is often viewed as relatively low-risk.

Analyzing how social networks evolve over time could prove insightful (network dynamics is currently a hot area in Social Network Analysis), as current methods such as these offer merely a snapshot of network structure, which may be conditioned by a number of factors previously listed. Observing the evolution and development of these networks over time could help researchers develop more incisive questions about social behavior and the dynamics of knowledge flows in online social networks than is practicable with current methods.

Early conclusions

We may be able to learn quite a bit about individual Somalis through the analysis of their online social networks, but for the moment probably best as an adjunct to the more traditional methods of direct oral engagement. In simple terms, when it comes to the bigger questions of global connections, I doubt facebook network analysis in its current form can tell us much that we don’t already know, or couldn’t find out simply by talking to people. Thus I would conclude these sorts of instruments should serve as a compliment to, rather than a replacement for, more traditional methodologies such as interviews, self-reporting of data, surveys and participant observation.

As a final disclaimer, none of this is meant to be an authoritative summary of research findings, but merely some early observations to set up as road markers of a sort, and ideas to be shared with others who might see different weaknesses or opportunities with this methodology.

As always, please feel free to share your thoughts in the comments below.

A brief list of references for further study:

Websites:

Gephi

Gephi resources page of SNA study examples from the community of users

NodeXL 

 

Books:

An excellent non-technical introduction to the science and theory of networks is: Six Degrees: The Science of a Connected Age, by Duncan Watts

Analyzing Social Media Networks with NodeXL: Insights from a Connected World

Mining the Social Web: Analyzing Data from Facebook, Twitter, LinkedIn, and Other Social Media Sites

 

Academic papers

Lewis, Kaufman, Gonzalez, Wimmer and Christakis, Tastes, ties, and time: A new social network dataset using Facebook.com, Social Networks, 2008

Bernie Hogan, A comparison of on and offline networks through the Facebook API, December 1, 2008, Oxford Internet Institute, 2008

A good methodology for the development paper-based sociograms is: Hogan, Carrasco and Wellman, Visualizing Personal Networks: Working with Participant-Aided Sociograms, Field Methods 2008

For large-scale social network information collected from mobile phone data, see Eagle, Pentland and Lazer, Inferring friendship network structure using mobile phone data, Proceedings of the National Academy of Sciences, 2009

A sense of the general debate over these new methods can be found in this recent New York Times article on analyzing historical court records, with one critic claiming that for much of data mining, “as yet it’s all method and no results.”

Follow

Get every new post delivered to your Inbox.

Join 178 other followers